Home Security

Security

RSA 2012: Learn about the Latest Security Myths

Visit Radware at booth #856. If you're headed to RSA 2012 in San Francisco, we hope you will stop by to meet the Radware team...

You can’t hide behind the Clouds

We’re beginning to hear more about content distribution network (CDN) providers burnishing their offerings with WAF-like capabilities.  While it appears to address some of...

In Security: Information Availability is Foundational

Information Availability is needed before Integrity & Confidentiality!!! Before I get into this heresy talk, let me start off by saying “I’m a security guy!” I...

You May Be Anonymous

According to a recent Norton study, cybercrime cost the global economy (in both direct damage and lost productivity time) $388 billion in 2011--significantly more...

Think you are secured? Think again following Anonymous cyber-attacks against Panama government website

On Saturday February 11, 2012 Anonymous Group coordinated a DDoS attack against Panama government website www.presidencia.gob.pa. The site suffered initially from service disruption but...

4 Massive Myths of DDoS

Myth #1: DDoS can be Solved by Adding Bandwidth Truth: As illustrated in the graph below, attacks in 2011 were quite varied and over 76%...

Israeli Website Hit with Country’s Largest Volumetric DDoS Attack on Record: What this Says About Cleaning the ISP Pipe

Today, we experienced the highest ever volumetric DDoS attack on an Israeli website. One of the leading news sites in Israel was hit by...

DDoS Attack Myths: Does Size Really Matter?

Major DDoS attacks are often portrayed in the media using measurement terms like “a 10Gbps DDoS attack hit site X” or “an 8 Million...

Giving Up On Security? How Security Companies Can Gain Trust Back

Following recent escalation of cyber attack campaigns by the Anonymous group and most recently the pro-Palestinian “hacktivists” (Saudi Arabian hacker “0xOmar”) that tried over...

CDN Networks as a Weapon for DDoS

Early in my career, I worked for CacheFlow (now BlueCoat). I spent a fair amount of time exploring proxy systems and how to abuse...

The Rise of “Auto Attacks,” Step aside Botnets!

Well, in case you missed it, the world has been going to “hell-in-a-hen-basket” over the past two weeks. The weeks have distinguished themselves as...

5 Questions About Anonymous’ New DDoS Techniques

In case anyone missed this news, Group Anonymous has put up code at pastehtml.com (a free and anonymous HTML code-hosting site) which uses your...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.

Agile Security Is Now A Reality

Businesses are looking to optimize and accelerate their SDLC, in order to improve their operational efficiency and gain a competitive edge.

New DemonBot Discovered

Are you using Hadoop for data analytics? If so, know that a new bot is targeting Hadoop clusters with the intention of performing DDoS...

IDBA: A Patented Bot Detection Technology

Over half of all internet traffic is generated by bots — some legitimate, some malicious. Competitors and adversaries alike deploy “bad” bots that leverage different methods to achieve nefarious objectives. This includes account takeover, scraping data, denying available inventory and launching denial-of-service attacks with the intent of stealing data or causing service disruptions.