SSL

Cyber-Attackers Are Adjusting to the Security Adjustments You’ve Made

Sometimes it feels terrible to be right. In our recent Global Application & Network Security Report we predicted an increase in complex encrypted attack...

Is Your Organization Prepared for Cyber Attacks? The 2015-2016 Global Application & Network Security Report

Few organizations are well prepared when it comes to cyber-attacks. Blending statistical research and front-line experience, and with more than 20 industries represented, Radware's new...

Ways to Protect Against Modern Day Spear Phishing

Anyone who works in the cyber-security field knows that phishing attacks – especially those against large enterprises – are on the rise.  The odd...

For Financial Services, An Outage May Be Preferable to This

It is easy to know when there is an outage.  Things do not work, people complain, and businesses lose money.  It is much harder...

Climbing the security and personal mountain in 2016

For my last blog in 2015 I'd like to address a very personal topic that has a lot in common with IT Security. A...

Security Messaging Can Speed Up Your Fight Against Cyber-Attacks

Cyber-attacks are no longer stories for technical journals – they are now front page news. These attacks are being carried out with increasing sophistication and...

SSL Breaks Bad: A Protective Technology Turned Attack Vector

It’s an unfortunate reality that things meant to do good can and do get misused for harm. Consider the myriad stories around criminals using Google...

DDoS Attack Myth: Larger Cyber-Attacks Do More Damage

“I just want to know that I’m safe from these 100Gbps plus attacks.” These are the words heard (or at least the sentiment expressed) over...

The History of the Cloud, Part I – Server Load Balancing

Isn’t it nice to know that when you are traveling, you have access to digital maps and precise location technologies like GPS?  It...

Can Low Cost “Always-On” DDoS Protection Keep You Safe?

“You get what you pay for.” This is true for many areas in life and it also applies to IT security. In the news again!...

The Cloud Path – Rerouting Traffic in Peacetime Solves some Cyber-Attack Risk, Creates Others

Last month, I wrote about some inherent challenges with the increasingly popular cloud-only model for cyber-attack mitigation. As a reminder, I am not a...

How Application Attacks Take Advantage of Holes in Legacy Network Security Solutions

The attacks that get the most news coverage have dramatic names that make for compelling headlines. You can practically feel the intensity of brute...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.

Agile Security Is Now A Reality

Businesses are looking to optimize and accelerate their SDLC, in order to improve their operational efficiency and gain a competitive edge.

Nation-State Attacks: Motivations & Consequences

Organizations leave sensitive, monetizable data unprotected, making cyberattacks a high-stakes, low-risk venture for nation-states.