Radware Threat Researchers Live: Ep.16 Special guest Mathieu Huysman, share about online game hacking with our hosts Pascal Geenens and Daniel Smith. Radware | December 13, 2021
Ransom DDoS, a Scenario Straight Out of Hollywood When it comes to ransom DDoS attacks there is only one question you should ask yourself. Are you ready? Readiness… Eva Abergel | November 8, 2021
Understanding Cloud Permissions and How to Control Excessive Permissions Key challenges of managing permissions in the cloud is that it provides additional types of permissions that are not observed… Radware | October 22, 2021
Why Inspecting Encrypted Traffic Is A Must The SSL inspection systems take advantage of the fact that the security is between two endpoints and not end-to-end. Prakash Sinha | June 23, 2021
How Do Marketers Add Security into Their Messaging? These days, data breaches are an everyday occurrence. Companies collect volumes of data about their customers, from basic contact information… Anna Convery-Pelletier | May 7, 2019
Is It Legal to Evaluate a DDoS Mitigation Service? A couple of months ago, I was on a call with a company that was in the process of evaluating… Dileep Mishra | March 27, 2019
DDoS Protection Requires Looking Both Ways Service availability is a key component of the user experience. Customers expect services to be constantly available and fast-responding, and… Eyal Arazi | March 26, 2019
CISOs, Know Your Enemy: An Industry-Wise Look At Major Bot Threats According to a study by the Ponemon Institute in December 2018, bots comprised over 52% of all Internet traffic. While… Abhinaw Kumar | March 21, 2019
The Intersections between Cybersecurity and Diversity Cybersecurity and diversity are high-value topics that are most often discussed in isolation. Both topics resonate with individuals and organizations… Kevin Harris | March 20, 2019
Bots 101: This is Why We Can’t Have Nice Things In our industry, the term bot applies to software applications designed to perform an automated task at a high rate… Daniel Smith | March 19, 2019
Security Pros and Perils of Serverless Architecture Serverless architectures are revolutionizing the way organizations procure and use enterprise technology. This cloud computing model can drive cost-efficiencies, increase… Radware | March 14, 2019
Will We Ever See the End of Account Theft? There’s an 87 Gigabyte file containing 773 Million unique email addresses and passwords being sold on online forums today called… David Hobbs | March 12, 2019