Home Security

Security

How to Fight Bad Bots and Win: Radware’s New Crypto Mitigation Algorithms

Facing a daily barrage of attacks by bad bots, today’s web application defenses are starting to show their age. The challenge is huge. A...

The Four Pillars of a Cybersecurity Strategy That Works

Understanding the threat landscape is one thing; extracting and leveraging actionable threat intelligence to reinforce an organization's defensive posture is another. Threat intelligence empowers...

Why Automation is a Must Have for Disaster Recovery

We have seen a spate of cloud service provider outages with overly negative economic impact. The AWS outage in December 2021 disrupted Disney+, Ticketmaster,...

The Security Vulnerabilities of Third-Party Collaboration Tools

How many of you still participate in-person meetings on a daily basis? If this question was asked before the beginning of 2020, it would have...

The Danger of API Security Overconfidence: Four Takeaways from Radware’s 2022 State of API Security Survey

A short list of the companies that have suffered recent API-related breaches are a who’s-who of the global technology brain trust: Microsoft,...

Q1 2022 DDoS and Application Attack Activity: An Overview

The cybersecurity threat landscape in the first quarter of 2022 represented a mix bag of old enemies and new foes. New actors...

Securing applications in the multi-cloud: Where should organizations start?

The cloud represents a gamechanger in the way businesses access and use technology, but it’s also brought with it major implementation challenges....

Radware Mitigates 1.1Tbps DDoS Attack

As more businesses migrate critical resources and applications to the public cloud, attackers are adapting their tactics and techniques to match the scale of...

How a European Electronics Retailer Ended the Bot Menace on its Portal

It’s May 2020 and a large European electronic goods retailer realizes its bot problem is going from bad to worse.

A New Security Approach for the New Age of Multi-Cloud 

Most organizations today deploy web applications across multi-cloud and hybrid environments. However, existing models for application security are obsolete and no longer up to the task of providing high-grade, consistent, and frictionless application security across clouds

Threat Researchers Live: Ep 19

Pascal Geenens and Daniel Smith discuss recent and notable security events like the Russian/Ukrainian cyber conflict.

Is DDoS a Crime?

The security industry fails to regulate blatant criminal activity, and the nation seems to be rewarding bad behavior with attention.

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

5 Steps to Prepare for a DDoS Attack

It’s inevitable almost as death and taxes: somewhere, at some point, you will come under a DDoS attack.

C-Suite Survey: Accelerated Cloud Migrations, Lagging Security

The 2020 “C-Suite Perspectives Report on IT Security” reveals that COVID-19 was a major accelerant for organizations to quickly migrate to the cloud.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.