SSL

Could Your Network Survive APDoS or Hit-and-Run DDoS?

Can you guess where a network breach first occurs? When a CISO asked this question during a recent business trip my answer was simple:  “Sure!...

Cyber-Attackers Are Adjusting to the Security Adjustments You’ve Made

Sometimes it feels terrible to be right. In our recent Global Application & Network Security Report we predicted an increase in complex encrypted attack...

Is Your Organization Prepared for Cyber Attacks? The 2015-2016 Global Application & Network Security Report

Few organizations are well prepared when it comes to cyber-attacks. Blending statistical research and front-line experience, and with more than 20 industries represented, Radware's new...

Ways to Protect Against Modern Day Spear Phishing

Anyone who works in the cyber-security field knows that phishing attacks – especially those against large enterprises – are on the rise.  The odd...

For Financial Services, An Outage May Be Preferable to This

It is easy to know when there is an outage.  Things do not work, people complain, and businesses lose money.  It is much harder...

Climbing the security and personal mountain in 2016

For my last blog in 2015 I'd like to address a very personal topic that has a lot in common with IT Security. A...

Security Messaging Can Speed Up Your Fight Against Cyber-Attacks

Cyber-attacks are no longer stories for technical journals – they are now front page news. These attacks are being carried out with increasing sophistication and...

SSL Breaks Bad: A Protective Technology Turned Attack Vector

It’s an unfortunate reality that things meant to do good can and do get misused for harm. Consider the myriad stories around criminals using Google...

DDoS Attack Myth: Larger Cyber-Attacks Do More Damage

“I just want to know that I’m safe from these 100Gbps plus attacks.” These are the words heard (or at least the sentiment expressed) over...

The History of the Cloud, Part I – Server Load Balancing

Isn’t it nice to know that when you are traveling, you have access to digital maps and precise location technologies like GPS?  It...

Can Low Cost “Always-On” DDoS Protection Keep You Safe?

“You get what you pay for.” This is true for many areas in life and it also applies to IT security. In the news again!...

The Cloud Path – Rerouting Traffic in Peacetime Solves some Cyber-Attack Risk, Creates Others

Last month, I wrote about some inherent challenges with the increasingly popular cloud-only model for cyber-attack mitigation. As a reminder, I am not a...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.

Getting Ready for 5G & IoT

Network performance improvements and IoT capabilities promise to help businesses move even faster. Yet uncertainty about this new technology is prevalent.

C-Suite Survey: Accelerated Cloud Migrations, Lagging Security

The 2020 “C-Suite Perspectives Report on IT Security” reveals that COVID-19 was a major accelerant for organizations to quickly migrate to the cloud.