Home Security

Security

Giving Up On Security? How Security Companies Can Gain Trust Back

Following recent escalation of cyber attack campaigns by the Anonymous group and most recently the pro-Palestinian “hacktivists” (Saudi Arabian hacker “0xOmar”) that tried over...

CDN Networks as a Weapon for DDoS

Early in my career, I worked for CacheFlow (now BlueCoat). I spent a fair amount of time exploring proxy systems and how to abuse...

The Rise of “Auto Attacks,” Step aside Botnets!

Well, in case you missed it, the world has been going to “hell-in-a-hen-basket” over the past two weeks. The weeks have distinguished themselves as...

5 Questions About Anonymous’ New DDoS Techniques

In case anyone missed this news, Group Anonymous has put up code at pastehtml.com (a free and anonymous HTML code-hosting site) which uses your...

Lesson Learned: ISPs & CDNs aren’t enough for Anti-DDoS

Well, I suppose that many in the Hacktivist world have resolved that 2012 would be a ‘breakout’ year for them as the level of...

2011: Why has Group Anonymous Been So Successful?

As we shut the door on 2011 and begin the planning efforts for 2012, I can’t help but be astonished on how effective the...

The Risks of Using SaaS from a DDoS Perspective

By David Hobbs – System Engineer at Radware David Hobbs focuses on security everyday, with 16 years experience battling the latest attempts by hackers to...

2012 Considerations Before Buying an Attack Mitigation System

Managing the security of critical information has proven a challenge for businesses and organizations of all sizes. Even companies that invest in the...

Cyber Monday: A Hacktivist’s Dream Come True?

So far this year has been astonishing for the “Named Attacks” by Hacktivists as illustrated in the chart below. In addition to these named...

The Hacking Eco-system: Fighting Cyber Attacks to Stay Profitable

Attacks and countermeasures typically focus on techniques, vulnerabilities, systems and tools.  There is another angle of the cat-and-mouse fight between attackers and victims --...

6 Key 2012 IT Security Considerations

By all indications 2011 will be known as a historic year in information security as threats added a whole new category of motive to...

A Friend in Need is a Friend Indeed

I just came back from a tour in Europe, meeting with both customers and journalists. It was a very interesting trip, dedicated to the...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

5 Steps to Prepare for a DDoS Attack

It’s inevitable almost as death and taxes: somewhere, at some point, you will come under a DDoS attack.

C-Suite Survey: Accelerated Cloud Migrations, Lagging Security

The 2020 “C-Suite Perspectives Report on IT Security” reveals that COVID-19 was a major accelerant for organizations to quickly migrate to the cloud.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.