Home Security Cloud Security

Cloud Security

“POP” Goes the Vendor that Doesn’t Separate Scrubbing Centers from Always-On Platforms

It seems hardly a week can pass without some cloud-based security service provider announcing the latest expansion of their cloud infrastructure. The cadence has...

Static Cloud Security Is Obsolete; Long Live Continuously Adaptive Cloud Security!

Successfully protecting against web-based attacks is like trying to win a game that keeps changing its rules all the time… only nobody tells you...

Virtualizing the ADC – Molding Mature Technologies for the Cloud

Virtualization of existing technologies is an evolutionary step in the development of cloud designs.  The cloud is supposed to be an architecture...

Themes, Conversations and Takeaways from 2016 RSA

The hackers are winning. Or said more accurately, strong security is losing . . . sometimes to itself.   That seemed to be a general...

Network-as-a-Sensor: A New Approach to the DDoS Problem

Mike Geller from Cisco’s CTO office and Ehud Doron of Radware’s CTO office presented at Cisco Live Berlin 2016 the revolutionary concept of Network-as-a-Sensor...

Cyber-Attackers Are Adjusting to the Security Adjustments You’ve Made

Sometimes it feels terrible to be right. In our recent Global Application & Network Security Report we predicted an increase in complex encrypted attack...

Don’t Let the Headlines Cloud Your Security Architecture Decisions

Information security professionals can hardly be blamed for a recent over-emphasis on looking to cloud-based solutions for protection for both network and application protection....

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.

Getting Ready for 5G & IoT

Network performance improvements and IoT capabilities promise to help businesses move even faster. Yet uncertainty about this new technology is prevalent.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.