The Current Surge of Bitcoin Prices It has long been known that if you want to participate in the Darknet marketplaces, you’ll need to exchange your… David Hobbs | January 11, 2017
How Lucrative is Confidential Data? Prime Bounty for Hackers, Top Concern for Businesses IT Professionals report securing sensitive data as the #1 challenge, even more than avoiding revenue loss or protecting reputation In… Ben Zilberman | January 10, 2017
2016: The Year of Cyber Ransom In 2015, we made a number of predictions for the upcoming year. One of the bigger predictions was that we… Radware | December 27, 2016
Millennials Most Likely to Pay a Ransom When Data is Digitally Hijacked How much someone is willing to pay in a ransom attack varies greatly by age, with younger consumers likely to… Radware | December 20, 2016
Cyber Security Predictions: Looking Back at 2016, Peering Ahead to 2017 2016: What a year! Internet of Things (IoT) threats became a reality and somewhat paradoxically spawned the first 1TBs DDoS—the… Carl Herberger | December 13, 2016
Is Heat Your Thermostat’s First Priority? Mirai has been popping on and off the news and is becoming a commodity resource for large scale DDoS attacks.… Pascal Geenens | December 1, 2016
Public Education Around Cyber Security Australia’s Prime Minister Malcolm Turnbull recently raised the issue of cyber security education during a Washington D.C. speech. The intention behind such… Paul Coates | September 28, 2016
As Cyber Security Programs Lose Their Moorings to Ransom-DoS: Radware Introduces the Ultimate Guide to Cyber Ransom The Growing Threat of Ransomware and RDoS—and What to Do About It Welcome to the world of cyber ransom—one of… Carl Herberger | September 14, 2016
In the Crosshairs: Six Cyber Security Threats Gunning for Your Online Business In today’s hyper-connected world, nearly all businesses, regardless of size or industry, have some element of their operations based online.… Radware | August 10, 2016
5 Cyber Attack Developments Worth Your Attention Are you concerned about being targeted? I am. As an IT person, it’s hard not be afraid when cyber attackers… Ben Zilberman | July 14, 2016
Early Attack Activity Forcing New Thinking in Healthcare IT/Security Every year when we conduct our survey for the Global Application & Network Security Report, one of the more interesting… Ben Desjardins | July 7, 2016
A View from the Corner Offices: New Research on C-Suite Security Mindset The role of the modern information security executive is, in many ways, an unenviable position. The continuous pressure to protect… Ben Desjardins | June 28, 2016