Home Security

Security

DefenseFlow: The First Ever SDN Application That Programs Networks for DoS/DDoS Security

Radware has announced its comprehensive SDN strategy and has introduced its first SDN Application: DefenseFlow™. Why is the DefenseFlow™ release so exciting? SDN is all...

ERT Alert: Massive #OpIsrael Attack Set for April 7

According to a March 19th post on the Solidarite avec la Palestine Facebook page, multiple hacker groups are joining hands to launch a massive...

How Application Delivery and Security Work Hand-in-Hand

At first glance, application delivery and security might seem unrelated because they appear to solve and address different challenges from different domains. But...

Inside the World of Hacker Reconnaissance

The inventor of the telephone, Alexander Graham Bell once stated, "Before anything else, preparation is the key to success." Unfortunately, it appears that attackers...

SDN and OpenFlow in 2013 – A Look Ahead

In 2012 OpenFlow discussions turned into SDN ones. Related although different in significant ways, both OpenFlow and SDN drove a significant level of attention...

Stock Exchanges in the Line of Fire

During last week's RSA conference in San Francisco, I gave a lecture titled "Stock Exchanges in the Line of Fire - Morphology of Cyber...

Security: On-Premise or In the Cloud? Radware’s DefensePipe Offers an End-to-End Solution

While most attacks are detected and mitigated on-premise, attacks that require greater scale are diverted and mitigated in the cloud. Now, you can stop...

When Servers Attack Your Bank: The Rise of Server Botnets

Imagine the following scenario: You’re a hosting company and you receive a call from one of the largest banks in the United States informing...

eCrime Congress in Germany: Restoring the Equilibrium of Attackers Vs. Defenders

Last week, I attended eCrime Congress in Frankfurt, Germany. Held on January 30,Radware was one of the sponsors of the event, which featured a...

Shooting From Behind the Fence

Can You Stay Anonymous While Participating in a DDoS Attack? Taking part in a Hacktivist group is completely different than being part of a Botnet....

Security Posture Drift: Thinking Old School

Charles Kolodgy is a Research Vice President for IDC's Security Products service and is a featured guest blogger. Security can't be set and forgotten because...

New Attack Trends – Are You Bringing a Knife to the Gunfight?

Today, we launched our 2012 Global Application and Network Security report. It was prepared by our security experts - the Emergency Response Team (ERT)...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

5 Steps to Prepare for a DDoS Attack

It’s inevitable almost as death and taxes: somewhere, at some point, you will come under a DDoS attack.

C-Suite Survey: Accelerated Cloud Migrations, Lagging Security

The 2020 “C-Suite Perspectives Report on IT Security” reveals that COVID-19 was a major accelerant for organizations to quickly migrate to the cloud.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.