Home Security

Security

2012 Considerations Before Buying an Attack Mitigation System

Managing the security of critical information has proven a challenge for businesses and organizations of all sizes. Even companies that invest in the...

Cyber Monday: A Hacktivist’s Dream Come True?

So far this year has been astonishing for the “Named Attacks” by Hacktivists as illustrated in the chart below. In addition to these named...

The Hacking Eco-system: Fighting Cyber Attacks to Stay Profitable

Attacks and countermeasures typically focus on techniques, vulnerabilities, systems and tools.  There is another angle of the cat-and-mouse fight between attackers and victims --...

6 Key 2012 IT Security Considerations

By all indications 2011 will be known as a historic year in information security as threats added a whole new category of motive to...

A Friend in Need is a Friend Indeed

I just came back from a tour in Europe, meeting with both customers and journalists. It was a very interesting trip, dedicated to the...

Radware CEO Talks Data Security with AMS

With so many ways for hackers to attack an organization, the only way for a company to stay safe is to go on the...

Fighting Cyber Attacks in Real Time with AMS

Most organizations that utilize network defense software have adopted a passive approach when attempting to stop cyber attacks.  That’s because most of the defense...

Security? Defense, Offense, Both?

Boy the world has gotten complicated to defend hasn't it? The old adage, "information security is very basic" turns out not to be true...

DoS Attack Forensic: Following Sherlock Holmes Footsteps

Denial-of-Service (DoS) Attack forensics has several motivations. When under attack, this process is important to identify the attacker and safely distinguish it from legitimate...

IPv6 Threats: What you should know before ramping up a new service layer

IPv6 was designed to solve the limited addressing space of IPv4 and includes built-in security features to provide authentication, data confidentiality and integrity. However,...

Top Things Your Service Provider Needs to Know About Security

So far, when one mentioned mobile security, it meant two possible security attack vectors. They were either attacks at the network perimeter - such...

Obama’s Cybersecurity Proposal: One Small Step for Preventing a Data Breach

Recently, the Obama administration sent a cybersecurity plan to the Senate for debate. The proposal outlined the universal regulations that all organizations should be...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.

Agile Security Is Now A Reality

Businesses are looking to optimize and accelerate their SDLC, in order to improve their operational efficiency and gain a competitive edge.

Nation-State Attacks: Motivations & Consequences

Organizations leave sensitive, monetizable data unprotected, making cyberattacks a high-stakes, low-risk venture for nation-states.