WAF

DevOps and Security: Yes We Can

Airlines, retailers, travel service providers, banks, marketplaces, and social media – all rely on their web applications to generate revenues or facilitate productivity. They...

Why WAF & DDoS – A Perfect Prearranged Marriage – #2

David Monahan is Research Director for Enterprise Management Associates (EMA) and is a featured guest blogger. In previous blogs I have written about DDoS attacks...

How Integrating Application Delivery and a Firewall is like Auto Repair

I took my car in for some work a while back. They had to replace a gasket on the engine because it was leaking...

5 Reasons Why Virtual Machine Security Could Become a Larger Threat

The recent Venom Vulnerability has been open since 2004. The ShellShock Vulnerability released last year was open for 25 years! What is happening now...

Protecting Your Applications Everywhere – Are You in Good Hands?

Cloud migration – one of the top trends this past year and predicted by many to be a top trend in 2015 – brings...

The Road to Cyber-Safety is Shifting to Hybrid Cloud WAF Protection

Hybrid Cloud WAF is the answer.  Now what was the question? Let’s back up a minute.  There is an ancient riddle which goes something like...

The Security Concerns of SSL/TLS Encrypted Traffic

Secure Sockets Layer (SSL) and Transport Layer Security (TLS) sites are used today to secure transactions on banking sites, health care portals, and enterprise...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

5 Steps to Prepare for a DDoS Attack

It’s inevitable almost as death and taxes: somewhere, at some point, you will come under a DDoS attack.

C-Suite Survey: Accelerated Cloud Migrations, Lagging Security

The 2020 “C-Suite Perspectives Report on IT Security” reveals that COVID-19 was a major accelerant for organizations to quickly migrate to the cloud.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.