Home Security

Security

How Hard Is It to Build a Botnet?

While working on Radware’s Ultimate Guide to Bot Management, I began wondering what would it take to build a botnet.

Navigating the Bot Ecosystem

Bots touch virtually every part of our digital lives -- and now account for over half of all web traffic.

Good Bots Vs. Bad Bots: What’s The Impact On Your Business?

Roughly half of today’s internet traffic is non-human (i.e., generated by bots). While some are good—like those that crawl websites for web indexing, content aggregation, and market or pricing intelligence—others are “bad.”

Healthcare is in Cybercriminals’ Crosshairs

The healthcare industry is a prime target of hackers. According to Radware's 2018-2019 Global Application and Network Security Report, healthcare was the second-most attacked industry after the government sector in 2018.

Security Considerations for Cloud Hosted Services

A multi-cloud approach enables organizations to move application services to various public cloud providers depending on the desired service level and price points.

How to Move Security Up the DevOps Priority List

If you are in the information security business like me, you have probably improved your frequent flyer status recently. Indeed, May-June are when most industry events occur. Like birds, we fly when spring arrives.

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.

Agile Security Is Now A Reality

Businesses are looking to optimize and accelerate their SDLC, in order to improve their operational efficiency and gain a competitive edge.

New DemonBot Discovered

Are you using Hadoop for data analytics? If so, know that a new bot is targeting Hadoop clusters with the intention of performing DDoS...

IDBA: A Patented Bot Detection Technology

Over half of all internet traffic is generated by bots — some legitimate, some malicious. Competitors and adversaries alike deploy “bad” bots that leverage different methods to achieve nefarious objectives. This includes account takeover, scraping data, denying available inventory and launching denial-of-service attacks with the intent of stealing data or causing service disruptions.