Home Security

Security

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.

Agile Security Is Now A Reality

Businesses are looking to optimize and accelerate their SDLC, in order to improve their operational efficiency and gain a competitive edge.

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

What to Do When You Are Under DDoS Attack

A DDoS attack can carry significant costs and consequences. However, these key steps can help minimize the impact and get you on your way to recovery.

How to Practice Safe Public Wi-Fi Usage

Radware recently surveyed more than 2,000 consumers to better understand how they handle their own personal data. What we learned is that...

A Healthy Bot Management Strategy

The quality of bot detection determines the quality of the solution. And as bots become ever more sophisticated, detection becomes ever more challenging.

Why In-House Bot Management Solutions Are Unreliable

In-house bot management solutions struggle to understand distinctive user behavior, and result in false positives and negatives.

Gaming Companies Beware: Cyber Criminals Are Coming For You, Too

Cyber criminals aren't just targeting gamers, they're also targeting the gaming industry and those that support it at high volumes for profit.

Empowering the Infosec Community

Despite the technological advancements, innovation, and experience the knights of the cyber order have acquired over the past 25 years or so, the "bad guys" are still a step ahead. Why? In large part, because of the power of community.

How Bots Use APIs to Infiltrate the Online World

APIs can be highly vulnerable, making them frequent attack targets. And they play a major role and fuel major risks when it comes to bot management.

Past GDPR Predictions: Have They Come To Fruition?

In July 2017, I wrote about GDPR and HITEC and asked if the past could predict the future.

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.

Agile Security Is Now A Reality

Businesses are looking to optimize and accelerate their SDLC, in order to improve their operational efficiency and gain a competitive edge.

New DemonBot Discovered

Are you using Hadoop for data analytics? If so, know that a new bot is targeting Hadoop clusters with the intention of performing DDoS...

IDBA: A Patented Bot Detection Technology

Over half of all internet traffic is generated by bots — some legitimate, some malicious. Competitors and adversaries alike deploy “bad” bots that leverage different methods to achieve nefarious objectives. This includes account takeover, scraping data, denying available inventory and launching denial-of-service attacks with the intent of stealing data or causing service disruptions.