Home Security Attack Mitigation

Attack Mitigation

The Costs of Cyberattacks Are Real

Customers put their trust in companies to deliver on promises of security. Think about how quickly most people tick the boxes on required privacy agreements, likely...

What Do Banks and Cybersecurity Have in Common? Everything.

New cyber-security threats require new solutions. New solutions require a project to implement them. The problems and solutions seem infinite while budgets remain bounded. Therefore,...

Looking Past the Hype to Discover the Real Potential of AI

How can organizations cut through the hype around AI to understand the most important issues they should be addressing? How can they incorporate AI into...

5 Ways Malware Defeats Cyber Defenses & What You Can Do About It

Malware is a key vector for data breaches. Research shows that 51% of data breaches include the usage of malware, whether for initial breach,...

How Cyberattacks Directly Impact Your Brand: New Radware Report

Whether you're an executive or practitioner, brimming with business acumen or tech savviness, your job is to preserve and grow your company’s brand. Brand...

10 Most Popular Blogs of 2018

Between large scale cyberattacks, the implementation of GDPR and increasing popularity of smart home technologies (and their associated vulnerabilities), we had a lot to...

2018 In Review: Healthcare Under Attack

Radware’s ERT and Threat Research Center monitored an immense number of events over the last year, giving us a chance to review and analyze...

Protecting Applications in a Serverless Architecture

Serverless architectures are revolutionizing the way organizations procure and use enterprise technology. Until recently, information security architecture was relatively simple; you built a fortress...

Growing Your Business: Security as an Expectation

Who is responsible for my device and application security? This is a critical question in today’s growing threat landscape, and one without a clear...

The Delta Airlines Security Breach: A Case Study in How to Respond to a Data Breach

Recent data breaches against Panera Bread, Delta Airlines, Sears, Saks, and Lord & Taylor highlight a lot: the need for improved web application and...

Consolidation in Consumer Products: Could it Solve the IoT Security Issues?

In 2003, I went to Zermatt, Switzerland to go snowboarding under the Matterhorn. We had an eclectic group of people from all over the...

Are Your Applications Secure?

Executives express mixed feelings and a surprisingly high level of confidence in Radware’s 2018 Web Application Security Report.  As we close out a year of...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.

Agile Security Is Now A Reality

Businesses are looking to optimize and accelerate their SDLC, in order to improve their operational efficiency and gain a competitive edge.

New DemonBot Discovered

Are you using Hadoop for data analytics? If so, know that a new bot is targeting Hadoop clusters with the intention of performing DDoS...

Navigating the Bot Ecosystem

Bots touch virtually every part of our digital lives -- and now account for over half of all web traffic.