Home Security Attack Mitigation

Attack Mitigation

Think Cybersecurity Insurance Will Save You? Think Again.

By this point, we know that state-sponsored cyber attacks are a thing. Time and again, we see headlines to this effect, whether...

Is It Legal to Evaluate a DDoS Mitigation Service?

A couple of months ago, I was on a call with a company that was in the process of evaluating DDoS mitigation...

DDoS Protection Requires Looking Both Ways

Service availability is a key component of the user experience. Customers expect services to be constantly available and fast-responding, and any downtime can result...

The Big, Bad Bot Problem

Roughly half of today’s internet traffic is non-human (i.e., generated by bots). While some are good—like those that crawl websites for web indexing, content...

The Costs of Cyberattacks Are Real

Customers put their trust in companies to deliver on promises of security. Think about how quickly most people tick the boxes on required privacy agreements, likely...

What Do Banks and Cybersecurity Have in Common? Everything.

New cyber-security threats require new solutions. New solutions require a project to implement them. The problems and solutions seem infinite while budgets remain bounded. Therefore,...

Looking Past the Hype to Discover the Real Potential of AI

How can organizations cut through the hype around AI to understand the most important issues they should be addressing? How can they incorporate AI into...

5 Ways Malware Defeats Cyber Defenses & What You Can Do About It

Malware is a key vector for data breaches. Research shows that 51% of data breaches include the usage of malware, whether for initial breach,...

How Cyberattacks Directly Impact Your Brand: New Radware Report

Whether you're an executive or practitioner, brimming with business acumen or tech savviness, your job is to preserve and grow your company’s brand. Brand...

10 Most Popular Blogs of 2018

Between large scale cyberattacks, the implementation of GDPR and increasing popularity of smart home technologies (and their associated vulnerabilities), we had a lot to...

2018 In Review: Healthcare Under Attack

Radware’s ERT and Threat Research Center monitored an immense number of events over the last year, giving us a chance to review and analyze...

Protecting Applications in a Serverless Architecture

Serverless architectures are revolutionizing the way organizations procure and use enterprise technology. Until recently, information security architecture was relatively simple; you built a fortress...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

5 Steps to Prepare for a DDoS Attack

It’s inevitable almost as death and taxes: somewhere, at some point, you will come under a DDoS attack.

C-Suite Survey: Accelerated Cloud Migrations, Lagging Security

The 2020 “C-Suite Perspectives Report on IT Security” reveals that COVID-19 was a major accelerant for organizations to quickly migrate to the cloud.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.