Home Security Attack Mitigation

Attack Mitigation

The Delta Airlines Security Breach: A Case Study in How to Respond to a Data Breach

Recent data breaches against Panera Bread, Delta Airlines, Sears, Saks, and Lord & Taylor highlight a lot: the need for improved web application and...

Consolidation in Consumer Products: Could it Solve the IoT Security Issues?

In 2003, I went to Zermatt, Switzerland to go snowboarding under the Matterhorn. We had an eclectic group of people from all over the...

Are Your Applications Secure?

Executives express mixed feelings and a surprisingly high level of confidence in Radware’s 2018 Web Application Security Report.  As we close out a year of...

Top Cryptomining Malware. Top Ransomware.

In 2018, cryptominers have emerged as the leading attack vector used by cybercriminals to gain access into others systems. Cryptominers are getting advanced makeovers by...

Obama’s Cyber-Security Proposals: Does this Safe Platform Translate to a Safer Network?

President Obama’s mention of cyber-security in last night’s State of the Union Address came as no surprise.  The Obama camp implemented a...

Read this List and Check it Twice — How to Protect Your Retail Business From Cyber-Attacks This Shopping Season

As consumers are getting their shopping lists ready for the biggest shopping days of the year, businesses should get ready as well.  Cyber-attacks,...

The “Easy Button” for Cyber-Attack Mitigation: Introducing Radware’s Attack Mitigation Service

Advancements are continually being made to defend organizations from cyber-attacks. I wanted to take some time to share some powerful reminders of how diligence...

Tsunami SYN Flood Attack – A New Trend in DDoS Attacks?

Over the past week Radware’s Emergency Response Team (ERT) detected a new type of SYN flood which is believed to be specially...

6 Types of DDoS Protection for Your Business

David Monahan is Research Director for Enterprise Management Associates (EMA) and is a featured guest blogger. DDoS attacks have become commonplace these days.  The...

Cyber Attacks on Oil and Gas

A few weeks ago, news agencies shared reports on the Energetic Bear attack. This cyber-attack, or rather virus, was reportedly introduced by a...

Anonymous Delivers DDoS to the 2014 World Cup

With an estimated viewing audience of over 3.2 billion globally, the 2014 World Cup draws a large amount of viewers to television screens around...

Consequences of Connection – How Mobile Security Threats Can Reach the IoT

Does mobile mean a handheld device in today’s world?  Not necessarily.  The term ‘mobile’ often applies to a phone or even a...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

5 Steps to Prepare for a DDoS Attack

It’s inevitable almost as death and taxes: somewhere, at some point, you will come under a DDoS attack.

C-Suite Survey: Accelerated Cloud Migrations, Lagging Security

The 2020 “C-Suite Perspectives Report on IT Security” reveals that COVID-19 was a major accelerant for organizations to quickly migrate to the cloud.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.