Home Security

Security

How to Respond to a DDoS Ransom Note

The damage from a DDoS ransom note can frequently be contained if dealt with in advance. Here are a few tips for handling a DDoS ransom note.

Keep It Simple: Choosing the Right DDoS Mitigation Strategy

The cyber industry offers a plenitude of DDoS mitigation solutions. Here are a few guidelines that can help simplify your selection process.

Top Cybersecurity Challenges Facing Government Agencies

The public sector is targeted by an array of threat actors, like hackers, hacktivists & state-sponsored threats. Here's how agencies can protect themselves.

What is the Future of Cybersecurity Jobs Post-COVID19?

The current situation presents interesting opportunities for job seekers and employers looking to reinvent their organizations.

How Should APAC Organizations Protect Critical Data & Assets?

The on-going effects of the pandemic are impacting businesses' cybersecurity. Here are the latest cyberthreats CIOs need to be aware of in the APAC region.

Cybersecurity: Pay Now or Pay (More) Later

Organizations must reevaluate how they balance the investment versus risk equation and alter how and when they implement cybersecurity.

Digital Attacks on Educational Resources

With closures in response to COVID & the looming threat of additional waves, schools have digitally transformed in ways we never could've imagined.

Six Steps for Securing Smart Cities

Smart city technologies can help improve urban areas if they can stay secure & retain the trust of citizens. Here are 6 ways they can do that.

4 Questions to Ask About Open Banking Compliance

Bot attacks on websites & applications are a well-known threat. But crucial APIs, including those used for Open Banking, are increasingly being targeted.

SSL: Protective Technology Turned Attack Vector

SSL is increasingly being used to mask and further complicate attack traffic detection in both network and application level threats.

How to Get an IT Security Job: 3 Hot Skill Sets

What skill sets do you need to be successful in cybersecurity today? Here are three big ones.

Safeguarding Sensitive Law Enforcement Data: A Case Study

A national law enforcement agency needed to construct a new data center that required a complex network infrastructure design based on security needs.

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.

Getting Ready for 5G & IoT

Network performance improvements and IoT capabilities promise to help businesses move even faster. Yet uncertainty about this new technology is prevalent.

C-Suite Survey: Accelerated Cloud Migrations, Lagging Security

The 2020 “C-Suite Perspectives Report on IT Security” reveals that COVID-19 was a major accelerant for organizations to quickly migrate to the cloud.