3 Security ‘Disconnects’ That Need To Be Addressed Here are three “disconnects" are causing serious problems within enterprises that decision makers are not doing enough to address. Michael Osterman | January 27, 2021
Strengthening Online Applications Against Pass-the-Cookie Attacks Cyber threat actors involved in cloud service attacks use a variety of tactics and techniques, including possible ‘pass-the-cookie’ attacks. Pascal Geenens | January 26, 2021
Protecting APIs & Securing Applications So Business Can Thrive Radware partnered with Osterman Research to study recent developments in the field of application infrastructure and data security. Ben Zilberman | January 20, 2021
2020-2021 State of Web Application & API Protection This report examines organizations’ level of awareness and visibility of application security & sheds light on different use cases. Radware | January 20, 2021
Enhancing Customer Application Security: A Case Study Here's how BG Unified Solutions enhanced its customer application security with Radware’s Cloud WAF Integrated with Bot Manager. Radware | January 7, 2021
Public Cloud Down Again? Predictions for 2021. In 2021, organizations will be more willing to hedge against having all computing eggs in one vendor basket. Prakash Sinha | December 10, 2020
Protecting Applications Across Multiple Clouds With cloud-based applications come new security risks that require expertise that can delay application deployment & maintenance. Radware | December 9, 2020
4 Approaches to Securing Containerized Applications As enterprises adopt containers running microservices, they are unsure how to secure these ecosystems. Here, we compare approaches. Ben Zilberman | October 21, 2020
From Survival to Security and Availability Availability, scalability and security must be addressed to keep both customer data and corporate IP and businesses safe from hacking… Prakash Sinha | October 14, 2020
Value Stream Mapping & Security in Software Development Prospects see built-in security in applications as value. Keep that in mind when designing the ecosystem and mapping activities &… Ben Zilberman | September 16, 2020
Ensuring Remote Access Availability & Security Remote access has become the most significant IT resource out there, and we must ensure its availability and security --… Yaniv Hoffman | June 9, 2020
Can DevSecOps Cover Holes Created by Digital Transformation? The success of DevSecOps is very much dependent on the understanding that the role isn’t only technical but also procedural. Ben Zilberman | May 21, 2020