Home Security

Security

Bots and Scripts for Abuse

In the last few years, we’ve discovered that many of our customers have been putting up with artificial clients hitting their websites. Scraping competitors’...

Radware’s Web Application Firewall, AppWall – ICSA Certified

We are pleased to announce that Radware’s Web Application Firewall, AppWall has received its ICSA Certification. I wanted to take a moment to explain...

Distinguish between legitimate users and attackers – The secret sauce of DDoS protection

Distributed Denial of Service (DDoS) is unique in the sense that these attacks actually consist of many legitimate individual requests. It is only the...

Killer Apps or Apps that Kill? How the “Soft War” is replacing the Cold War in 2013

Last night, the Wall Street Journal ran a story around the Food and Drug Administration’s (FDA) warning to makers of medical devices that the...

Security Week Article: Next Generation Mobile Networks Come with Next Generation Security Threats

This past weekend, Security Week ran a byline I wrote regarding Long Term Evolution (LTE). Although this brings the promise of relieving...

Why Low & Slow DDoS Application Attacks are Difficult to Mitigate

The naïve and still common perception of DoS/DDoS attacks is that to be destructive, attacks must use brute force and generate massive traffic. Low...

Can your firewall and IPS block DDoS attacks?

More and more organizations realize that DDoS threats should receive higher priority in their security planning. However, many still believe that the traditional security...

How Much Can a DDoS Attack Cost Your Business?

Quite a lot, it seems. The Ponemon Institute study estimates that the average cost of one minute of downtime due to a...

What It’s Like to Get Hit With a DDoS Attack – An Inside View

It’s not always obvious to a network or system administrator that their company’s infrastructure is under attack. In fact, an attack usually starts slowly...

Pinpointing the Blame for Cyber Attacks – 3 Reasons Why it’s Harder than you Think

As the cyber security landscape evolves and attacks become more sophisticated and malicious, the question of responsibility has grown increasingly important. Despite the fact...

ERT ALERT: Cyber-attack Against U.S. Based Websites on May 7th – 4 Attack Methods to Expect

AnonGhost – A hacking group affiliated with Anonymous announced a new cyber-attack campaign against US websites named #OPUSA. The attack is scheduled for May...

WordPress Sites Exploited Through Brute Force: 3 Simple Ways to Protect Yourself from the Attack

During the past week we noticed an abnormal increase of brute force attacks targeting WordPress applications. The attacks use automated scripts that attempt to login...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

Getting Ready for 5G & IoT

Network performance improvements and IoT capabilities promise to help businesses move even faster. Yet uncertainty about this new technology is prevalent.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.