2018: Snapshot of the Most Important Worldwide Cybersecurity Laws, Regulations, Directives and Standards Are you out of breath from the breakneck pace of cyberattacks since the start of 2018? Throughout the world, nearly… Carl Herberger | June 5, 2018
The Hybrid Cloud Habit You Need to Break A little while ago, security professionals from my firm watched as hackers began probing the network of a large financial… Mike O'Malley | May 31, 2018
5 Must-Have DDoS Protection Technologies Distributed Denial of Service (DDoS) attacks have entered the 1 Tbps DDoS attack era. However, Radware research shows that DDoS… Eyal Arazi | May 30, 2018
Detecting Malware/APT Through Automatic Log Analysis Legacy perimeter security mechanisms can be evaded very easily. It’s disappointing, but it’s true. Innovatively-designed malware and APTs have the… Fabio Palozza | May 23, 2018
Cybersecurity & The Customer Experience: The Perfect Combination Organizations have long embraced the customer experience and declared it a competitive differentiator. Many executives are quick to focus on… Anna Convery-Pelletier | May 22, 2018
Smart Homes of Tomorrow – This Is Why We Can’t Have Nice Things Privacy, vulnerability and reliability are the three main issues almost every connected device currently on the market faces, yet consumers… Daniel Smith | May 17, 2018
Federal CISO: Superhero Needed A famous leadership coach said, “Only Superman can leap tall buildings in a single bound, the rest of us must… Carl Herberger | May 16, 2018
GDPR in Action, Even Facebook Impacted As Europe awaits the General Data Protection Regulation (GDPR) to come into force on May 25th, Facebook is enforcing new… Fabio Palozza | May 15, 2018
Nigelthorn Malware Abuses Chrome Extensions to Cryptomine and Steal Data Individual research contributed by Adi Raff and Yuval Shapira. On May 3, 2018, Radware’s cloud malware protection service detected a… Radware | May 10, 2018
6 Must-Have Metrics in Your SLA Your Service Level Agreement (SLA) is a crucial component of DDoS defenses. It is your contractual guarantee outlining what your… Eyal Arazi | May 9, 2018
The 7 Craziest IoT Device Hacks Internet of Things (IoT) botnets have forever changed cyber-security. When an IoT botnet – which is a group of internet-connected… Mike O'Malley | May 8, 2018
High-Performance Visibility into SSL/TLS Traffic Protection of your business’s confidential information and prevention of data breaches are crucial to supporting successful business operations. This necessarily… Fabio Palozza | May 2, 2018