Home Security Application Security

Application Security

Radware Attack Mitigation Black Belt Challenge – Yellow Belt Round

I want to thank everyone for a successful launch of the Attack Mitigation Black Belt Challenge! People from all over the world participated...

Radware’s Attack Mitigation Black Belt Challenge

Well congratulations! If you are interested in this blog post you are on your way earning the Attack Mitigation Black Belt Champion title and...

The Three Myths of the Availability Threat

Availability – aka the big “A” – is often the overlooked leg of the CIA triad (the others being Confidentiality and Integrity). Perhaps one...

Radware ERT helps fight Flame at the Enterprise Level

Security specialists describe the malware Flame, also known as Flamer, as the most advanced computer virus ever found and a new level of sophistication...

ERT Threat Alert: TheWikiBoat Group Targets the World’s Largest Organizations

Radware’s Emergency Response Team (ERT) releases a new threat alert regarding an upcoming DDoS attack on Friday, May 27th.

Operation Blackout: Can Anonymous Succeed on March 31st?

Much has been written about Operation Blackout: the threat of Anonymous to take out the world's thirteen root Internet servers. This operation has been...

RSA 2012: Learn about the Latest Security Myths

Visit Radware at booth #856. If you're headed to RSA 2012 in San Francisco, we hope you will stop by to meet the Radware team...

In Security: Information Availability is Foundational

Information Availability is needed before Integrity & Confidentiality!!! Before I get into this heresy talk, let me start off by saying “I’m a security guy!” I...

DDoS Attack Myths: Does Size Really Matter?

Major DDoS attacks are often portrayed in the media using measurement terms like “a 10Gbps DDoS attack hit site X” or “an 8 Million...

Giving Up On Security? How Security Companies Can Gain Trust Back

Following recent escalation of cyber attack campaigns by the Anonymous group and most recently the pro-Palestinian “hacktivists” (Saudi Arabian hacker “0xOmar”) that tried over...

5 Questions About Anonymous’ New DDoS Techniques

In case anyone missed this news, Group Anonymous has put up code at pastehtml.com (a free and anonymous HTML code-hosting site) which uses your...

Lesson Learned: ISPs & CDNs aren’t enough for Anti-DDoS

Well, I suppose that many in the Hacktivist world have resolved that 2012 would be a ‘breakout’ year for them as the level of...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

5 Steps to Prepare for a DDoS Attack

It’s inevitable almost as death and taxes: somewhere, at some point, you will come under a DDoS attack.

C-Suite Survey: Accelerated Cloud Migrations, Lagging Security

The 2020 “C-Suite Perspectives Report on IT Security” reveals that COVID-19 was a major accelerant for organizations to quickly migrate to the cloud.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.