Pinpointing the Blame for Cyber Attacks – 3 Reasons Why it’s Harder than you Think As the cyber security landscape evolves and attacks become more sophisticated and malicious, the question of responsibility has grown increasingly… Michael Atkinson | April 26, 2013
ERT ALERT: Cyber-attack Against U.S. Based Websites on May 7th – 4 Attack Methods to Expect AnonGhost – A hacking group affiliated with Anonymous announced a new cyber-attack campaign against US websites named #OPUSA. The attack… Yaniv Balmas | April 19, 2013
WordPress Sites Exploited Through Brute Force: 3 Simple Ways to Protect Yourself from the Attack During the past week we noticed an abnormal increase of brute force attacks targeting WordPress applications. The attacks use automated… Yaniv Balmas | April 15, 2013
DefenseFlow: The First Ever SDN Application That Programs Networks for DoS/DDoS Security Radware has announced its comprehensive SDN strategy and has introduced its first SDN Application: DefenseFlow™. Ron Meyran | April 15, 2013
ERT Alert: Massive #OpIsrael Attack Set for April 7 According to a March 19th post on the Solidarite avec la Palestine Facebook page, multiple hacker groups are joining hands… Eyal Benishti | April 2, 2013
How Application Delivery and Security Work Hand-in-Hand At first glance, application delivery and security might seem unrelated because they appear to solve and address different challenges from… Nir Ilani | March 29, 2013
Inside the World of Hacker Reconnaissance The inventor of the telephone, Alexander Graham Bell once stated, "Before anything else, preparation is the key to success." Unfortunately,… Eyal Benishti | March 19, 2013
SDN and OpenFlow in 2013 – A Look Ahead In 2012 OpenFlow discussions turned into SDN ones. Related although different in significant ways, both OpenFlow and SDN drove a… Lior Cohen | March 11, 2013
Stock Exchanges in the Line of Fire During last week’s RSA conference in San Francisco, I gave a lecture titled "Stock Exchanges in the Line of Fire… Ziv Gadot | March 6, 2013
Security: On-Premise or In the Cloud? Radware’s DefensePipe Offers an End-to-End Solution While most attacks are detected and mitigated on-premise, attacks that require greater scale are diverted and mitigated in the cloud.… Ronen Kenig | February 26, 2013
When Servers Attack Your Bank: The Rise of Server Botnets Imagine the following scenario: You’re a hosting company and you receive a call from one of the largest banks in… Matan Atad | February 19, 2013
eCrime Congress in Germany: Restoring the Equilibrium of Attackers Vs. Defenders Last week, I attended eCrime Congress in Frankfurt, Germany. Held on January 30,Radware was one of the sponsors of the… Ron Meyran | February 8, 2013