SSL

The Stages of Online Business Transformation Come With Benefits… and Risks

As a father of teenaged children, I sometime marvel at the level of network-connectedness of that younger generation. It is fair to say...

When Trends Collide – Ransomware and IoT Attacks Continue

A highlight of the annual Global Network & Application Security Report is always the deep case studies. Each year, we work closely with a...

Could Your Network Survive APDoS or Hit-and-Run DDoS?

Can you guess where a network breach first occurs? When a CISO asked this question during a recent business trip my answer was simple:  “Sure!...

Cyber-Attackers Are Adjusting to the Security Adjustments You’ve Made

Sometimes it feels terrible to be right. In our recent Global Application & Network Security Report we predicted an increase in complex encrypted attack...

Is Your Organization Prepared for Cyber Attacks? The 2015-2016 Global Application & Network Security Report

Few organizations are well prepared when it comes to cyber-attacks. Blending statistical research and front-line experience, and with more than 20 industries represented, Radware's new...

Ways to Protect Against Modern Day Spear Phishing

Anyone who works in the cyber-security field knows that phishing attacks – especially those against large enterprises – are on the rise.  The odd...

For Financial Services, An Outage May Be Preferable to This

It is easy to know when there is an outage.  Things do not work, people complain, and businesses lose money.  It is much harder...

Climbing the security and personal mountain in 2016

For my last blog in 2015 I'd like to address a very personal topic that has a lot in common with IT Security. A...

Security Messaging Can Speed Up Your Fight Against Cyber-Attacks

Cyber-attacks are no longer stories for technical journals – they are now front page news. These attacks are being carried out with increasing sophistication and...

SSL Breaks Bad: A Protective Technology Turned Attack Vector

It’s an unfortunate reality that things meant to do good can and do get misused for harm. Consider the myriad stories around criminals using Google...

DDoS Attack Myth: Larger Cyber-Attacks Do More Damage

“I just want to know that I’m safe from these 100Gbps plus attacks.” These are the words heard (or at least the sentiment expressed) over...

The History of the Cloud, Part I – Server Load Balancing

Isn’t it nice to know that when you are traveling, you have access to digital maps and precise location technologies like GPS?  It...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

5 Steps to Prepare for a DDoS Attack

It’s inevitable almost as death and taxes: somewhere, at some point, you will come under a DDoS attack.

C-Suite Survey: Accelerated Cloud Migrations, Lagging Security

The 2020 “C-Suite Perspectives Report on IT Security” reveals that COVID-19 was a major accelerant for organizations to quickly migrate to the cloud.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.