Home Security

Security

Retailers, How Much of Your Holiday Traffic is Actually Human?

In order to better predict bot behavior for the 2019 holiday season, we analyzed the 2018 November-December bot data from our network. Here's what we found.

Why Organizations are Failing to Deal With Rising Bot Attacks

Despite serious threats, businesses aren't adopting bot management solutions; they are instead using in-house resources, putting user security at risk.

How to Recover from a DDoS Attack

Recovering from a DDoS attack is no simple matter, but once an attack is over, it is time to assess the impact, evaluate your defenses, and better prepare for the next incident.

TCP Reflection Attacks: Then and Now

Expect to see TCP amplification used in parallel with UDP amplification as part of a multi-vector campaign designed to defeat mitigation defenses.

Threat Alert: TCP Amplification Attacks

Throughout 2019, Radware’s Threat Research Center (TRC) and Emergency Response Team (ERT) have been monitoring and defending against an increasing number of TCP reflection...

Cloud-Native Application Security Challenges

With all the power that microservice architectures and service mesh infrastructures provide, they do not address application and data security challenges.

Consistent Security Meets Continuous Deployment on Azure

Today's focus on continuous integration and deployment makes it difficult for security teams to identify and mitigate risks.

The State of AI in Cybersecurity Today

Artificial intelligence is a requirement to keep ahead of cyber threats today and even more so in the future.

The (Security) Dangers of Over Confidence

Organizations did not recognize that a scattered approach to web application security left them vulnerable to attack, and confidence remained high.

Happy Dyn Attack Anniversary!

There is a vast underground that thrives and grows on the digitization of our economy, and demonstrate no signs of slowing down any time soon.

Enhancing Application Security Processes

Organizations are performing a balancing act, pushing forward with digital transformation while seeking ways to optimize application security.

10 Commandments for Securing Microservices

Here are 10 characteristics to look for when considering protection to data and applications in a service mesh architecture.

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.

Agile Security Is Now A Reality

Businesses are looking to optimize and accelerate their SDLC, in order to improve their operational efficiency and gain a competitive edge.

Nation-State Attacks: Motivations & Consequences

Organizations leave sensitive, monetizable data unprotected, making cyberattacks a high-stakes, low-risk venture for nation-states.