Virtualizing the ADC – Molding Mature Technologies for the Cloud Virtualization of existing technologies is an evolutionary step in the development of cloud designs. The cloud is supposed to be… Frank Yue | April 5, 2016
Themes, Conversations and Takeaways from 2016 RSA The hackers are winning. Or said more accurately, strong security is losing . . . sometimes to itself. That… Ben Desjardins | March 10, 2016
Network-as-a-Sensor: A New Approach to the DDoS Problem Mike Geller from Cisco’s CTO office and Ehud Doron of Radware’s CTO office presented at Cisco Live Berlin 2016 the… Ron Meyran | February 17, 2016
Cyber-Attackers Are Adjusting to the Security Adjustments You’ve Made Sometimes it feels terrible to be right. In our recent Global Application & Network Security Report we predicted an increase… Ben Desjardins | February 16, 2016
Don’t Let the Headlines Cloud Your Security Architecture Decisions Information security professionals can hardly be blamed for a recent over-emphasis on looking to cloud-based solutions for protection for both… Ben Desjardins | September 3, 2015