Home Security Application Security

Application Security

Facebook, Google, Yahoo — How Hackers Can Use Everyday Sites for Reflection & Amplification Attacks

Reflection and amplification attacks are used to extend DDoS harm. Recently, I discussed how the most recent unwelcome arrival of HTTP-based reflectors and...

A Snapshot of DDoS Regulations: 6 Protection Initiatives

In the first four months of 2014, news reports have regularly detailed cyber-attacks that have affected victims ranging from small companies to nation-states. ...

Why Cyber Attackers are Still Defeating Your Network Security

Nearly, two years ago I questioned the myth: does size really matter? and now it’s time to revisit the issue and also look...

WordPress DDoS and other HTTP Reflectors

Lately, there has been a lot of buzz about reflection and amplification attacks extending DDoS harm.  The new kid on this attack...

Was NATO Hit by a DNS Attack?

The latest developments in the Russia-Ukraine cyberwar battle have garnered huge media attention.  It was also recently revealed that the cyber attacks...

To Err Human, To Automate Secure

"To err is human." This quote by British poet Alexander Pope gained new meaning to me after reading a follow-up article by Information Week on...

DDoSed by the Troll

For a large number of online gamers that planned to spend their holiday break playing online games such as League of Legends,  Minecraft,...

Personal Data – When the Invaluable Falls into the Wrong Hands

Recently, the news has listed numerous egregious data thefts from large insurance companies as well as concerns of data security from the infamous Healthcare.gov...

A Perfect Cyber Storm: September 11th, Black Friday and Other Enticing Dates for Cyber Attacks

After reading this article and piecing through the motivations of the hactivist group illustrated in the story, I couldn’t help but think how...

Distinguish between legitimate users and attackers – The secret sauce of DDoS protection

Distributed Denial of Service (DDoS) is unique in the sense that these attacks actually consist of many legitimate individual requests. It is only the...

Killer Apps or Apps that Kill? How the “Soft War” is replacing the Cold War in 2013

Last night, the Wall Street Journal ran a story around the Food and Drug Administration’s (FDA) warning to makers of medical devices that the...

Security Week Article: Next Generation Mobile Networks Come with Next Generation Security Threats

This past weekend, Security Week ran a byline I wrote regarding Long Term Evolution (LTE). Although this brings the promise of relieving...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

C-Suite Survey: Accelerated Cloud Migrations, Lagging Security

The 2020 “C-Suite Perspectives Report on IT Security” reveals that COVID-19 was a major accelerant for organizations to quickly migrate to the cloud.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.

Getting Ready for 5G & IoT

Network performance improvements and IoT capabilities promise to help businesses move even faster. Yet uncertainty about this new technology is prevalent.