WAF

4 Ways Rate Limiting is Losing You Business

Using rate limiting for website protection has significant drawbacks when it comes to your business. Here are four ways rate limiting is costing you...

Outbound SSL Solutions Protect Assets in the Wild

Businesses need to protect their assets when they are within their protective infrastructure AND when they are actively exposed or placed within the unprotected...

Cloud WAF: Why a Checkbox Isn’t Enough

I remember when I first learned about Web application firewall technology. It seemed like magic to me: A device that could compensate for bad...

CDN Security is NOT Enough for Today

  Today, many organizations are now realizing that DDoS defense is critical to maintaining an exceptional customer experience. Why? Because nothing diminishes load times or...

WAF and DDoS – Perfect Bedfellows: Every Business Owner Must Read.

Among the reasons to marry DDoS & WAF (web application firewall) together, beyond a single pane of glass, beyond single vendor and quick technical...

10 Cyber Security Questions with Radware’s Pascal Geenens

Radware’s Pascal Geenens walks us through 10 questions regarding the cyber security threat landscape, trends in the Darknet, motivations for attacks, and much more. What...

WAF and DDoS Help You on the Road to GDPR Compliancy

Data is the currency of today's digital economy, the oil of the 21st century. Personal data is considered our economical asset generated by our...

Sometimes Cloud Solutions Fall Short

In retail marketing, companies often try to add value to a product with the addition of extra items that are discounted or free. In...

The Not-So Odd Couple of DDoS and WAF

As the saying goes in the real world, “necessity is the mother of invention.” However, those of us that work in the technology sector...

Cover Your Bases to Protect Your Organization From Advanced Threats

Organizations can protect themselves against advanced threats by adopting the right strategy. This strategy involves getting the right players on the field, with...

DevOps and Security: Yes We Can

Airlines, retailers, travel service providers, banks, marketplaces, and social media – all rely on their web applications to generate revenues or facilitate productivity. They...

Why WAF & DDoS – A Perfect Prearranged Marriage – #2

David Monahan is Research Director for Enterprise Management Associates (EMA) and is a featured guest blogger. In previous blogs I have written about DDoS attacks...

Must Read

Navigating the Bot Ecosystem

Bots touch virtually every part of our digital lives -- and now account for over half of all web traffic.

A Buyer’s Guide to Bot Management

Web-based bots are a critical part of your business’s digital presence.

How Hard Is It to Build a Botnet?

While working on Radware’s Ultimate Guide to Bot Management, I began wondering what would it take to build a botnet.

Layer 7 Attack Mitigation

The DDoS world hits new records lately, with the attacks on KrebsOnSecurity.com and later on OVH and Dyn reached a bandwidth of more than...

New DemonBot Discovered

Are you using Hadoop for data analytics? If so, know that a new bot is targeting Hadoop clusters with the intention of performing DDoS...