Home Security

Security

Much more than Outage: 2013 DDoS Market Review

What comes to mind when the term “Denial of Service” is mentioned? Probably website outage. This image has been crafted over the last couple...

DDoSed by the Troll

For a large number of online gamers that planned to spend their holiday break playing online games such as League of Legends,  Minecraft,...

Your Favorite Posts of 2013

Here’s a roundup of our most-read posts of 2013.  We thought it’d be interesting to look back on a year’s worth of blogs...

Credit Card Breach at a Major U.S. Retailer – Are you one of the 40 Million Targeted?

If you’re one of the 40+ million people who went shopping this holiday season at Target, hackers may have stolen the information that’s carried...

Personal Data – When the Invaluable Falls into the Wrong Hands

Recently, the news has listed numerous egregious data thefts from large insurance companies as well as concerns of data security from the infamous Healthcare.gov...

Five Indications that an “Electronic Pearl Harbor” is Possible, if not Plausible

During the past year, we have become numb to the sheer outrage of cyber-attacks and the devastating impacts they have left in our wake....

Securing Your Web Site: The Wild Goose Chase

The revised Payment Cards Industry Data Security Standard (PCI-DSS) that was released last Thursday did not provide any ground breaking news regarding...

More Bots and Aggressive API Abuse

In my last article about Bots and Scrapers for abuse, we explored some of the issues surrounding scripts and bots for abusing retailers....

Moving to Mobile – The Changing Face of DDoS

Like any data communication network, mobile networks contain a range of security threats. Though some threats are easy to identify and mitigate, the unique...

A Perfect Cyber Storm: September 11th, Black Friday and Other Enticing Dates for Cyber Attacks

After reading this article and piecing through the motivations of the hactivist group illustrated in the story, I couldn’t help but think how...

A Look Back at Black Hat: Staying True to its Roots, But Never the Same without Barnaby Jack

Black Hat has come and gone again, the swag has been dispersed, the livers are recovering and delegates are returning to their normal lives...

Bots and Scripts for Abuse

In the last few years, we’ve discovered that many of our customers have been putting up with artificial clients hitting their websites. Scraping competitors’...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

Getting Ready for 5G & IoT

Network performance improvements and IoT capabilities promise to help businesses move even faster. Yet uncertainty about this new technology is prevalent.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.