Airlines, retailers, travel service providers, banks, marketplaces, and social media – all rely on their web applications to generate revenues or facilitate productivity. They typically develop and maintain their own web applications which are tailored for their business needs. To support the growing needs of their online presence, they are adopting agile development practices also known as DevOps and Continuous Deployment.
On occasion, the topic of DDoS defense has come up and invariably goes to, “Why can’t organizations rely on ISP and cloud scrubbing services to protect themselves from DDoS attacks?” The conversation also rolls over to, “Why can’t organizations rely on on-premises solutions to protect themselves from DDoS attacks?” The latter is usually asked by someone who is a novice in the field, but both are valid questions. The true answer lies with a combination defense or, to coin a common security phrase, “defense-in-depth.”
Cloud migration – one of the top trends this past year and predicted by many to be a top trend in 2015 – brings with it many benefits to the organization. You can enjoy cost savings, scalability, flexibility, and productivity benefits for your organization, your customers and your partners. Regardless of the industry they belong to, today’s enterprises are finding that the cost and speed advantages of cloud cannot be ignored.
During the past week we noticed an abnormal increase of brute force attacks targeting WordPress applications.
The attacks use automated scripts that attempt to login to WordPress default admin page using common usernames and passwords.
At first glance, application delivery and security might seem unrelated because they appear to solve and address different challenges from different domains. But a closer look actually reveals that they are entwined. In this post I’ll break down the ways in which application delivery and security work hand-in-hand.
Knowledge Test Overview
Wow! The Attack Mitigation Black Belt Challenge is only two weeks old and already we have dueling leaders and intense competition.
People from all over the world are participating in Radware’s first Attack Mitigation Black Belt Challenge and only seven seconds separates the current leader, “dh”, from the fifth place position. It is apparent that some questions were stumbling blocks as we had two questions in the Yellow Belt round that only 10% of the participants could answer properly.
Well-kept secrets – The importance of blocking and masking measures for data leakage prevention
Nowadays organizations are more and more data driven. Thanks to advancements in technology, companies can track and analyze customers’ behavior, collecting a multitude of parameters, and store the information to better offer them a more personal experience. On the positive side, end-users get a customized service adapted to his or her preferences – the bank offers customer customized financial tracks; the HMO shows lab results comparisons based on medical history; the social media site delivers content based on location, keywords, and browsing patterns.
As we shut the door on 2011 and begin the planning efforts for 2012, I can’t help but be astonished on how effective the Group Anonymous attacks have been. Vast majorities of targeted organizations have been left licking their wounds and posthumously responding to numerous queries on what happened and why they weren’t protected.