SSL

Cyber Security Predictions

2016 was the Year of DDoS. 2017 was the Year of Ransom. Can we assess leading indicators of new attack techniques and motivations to...

Financial Institutions Must Protect the Data Like They Protect the Money

If you are like most people and myself, you do not go into a bank and have a conversation with a teller when you...

5 Key Items for the Digital Transformation of Healthcare

People’s lives are at risk as the healthcare industry transforms patient care with modern IT technologies. Data security and application availability are essential when...

2017’s 5 Most Dangerous DDoS Attacks & How to Mitigate Them (Part 1)

Throughout the history of mankind, whether in warfare or crime, the advantage has swung between offense and defense, with new technologies and innovative tactics...

SSL Attacks – When Hackers Use Security Against You

In World War II, the Allies had a significant advantage because they were able to compromise the encryption protocols that the Japanese and Germans...

Outbound SSL Solutions Protect Assets in the Wild

Businesses need to protect their assets when they are within their protective infrastructure AND when they are actively exposed or placed within the unprotected...

Cyber and Securities – Financial Institutions Attack Landscape

Recently Italian bank Unicredit suffered two security breaches. Data of 400,000 customers was stolen, including loan account numbers and Personally Identifiable Information (PII). There...

The ADC is the Key Master for All Things SSL/TLS

In the movies (and real life) one often needs to go through the Key Master to get to the destination. The job of the...

The World is Changing

The world is changing; it always has but the world is changing faster now than it ever has before. This general change is translating...

To stay secure: Four new SSL implementation thoughts

10 years ago, I left my position as the principal architect at a major U.S. financial institution. We developed the standards for how SSL...

Network Security Does Not Matter When You Invite the Hacker Inside

We build security solutions to protect our networks from the rest of the internet, but do we do anything to protect the network from...

5G Mobile Security Challenge

A few months ago, I attended the 5G World Congress and listened to discussions around the many challenges and technical requirements facing 5G technology. The questions...

Must Read

Navigating the Bot Ecosystem

Bots touch virtually every part of our digital lives -- and now account for over half of all web traffic.

A Buyer’s Guide to Bot Management

Web-based bots are a critical part of your business’s digital presence.

How Hard Is It to Build a Botnet?

While working on Radware’s Ultimate Guide to Bot Management, I began wondering what would it take to build a botnet.

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

Layer 7 Attack Mitigation

The DDoS world hits new records lately, with the attacks on KrebsOnSecurity.com and later on OVH and Dyn reached a bandwidth of more than...