This post is also available in: Chinese (Simplified) Chinese (Traditional) French German Italian Japanese Korean Portuguese (Brazil) Spanish Russian

Home Uncategorized

Uncategorized

A Three-Episode DDoS Ransom Attack Prologue

DDoS attacks are becoming a part of ransom attacks. Instead of infiltrating secure organizational assets, attackers are launching devastating attacks

The Most Important Question to Ask Security Vendors Before Hiring Them

False positives remain a significant concern that affects your chances of closing a deal or making a sale.

What Does a Unified Security Strategy in the Public Cloud Look Like?

Gain insight about how to build a unified security strategy across large network organizations and how to translate it to the public cloud

A Quick History of IoT Botnets

The Internet of Things (IoT) describes a world where just about anything is an Internet-enabled device. IoT is comprised of smart physical objects such...

State of the Union: Page Speed & Web Performance [INFOGRAPHIC]

Last week, we released our quarterly State of the Union for ecommerce web performance. This week, I want to share a poster version of the infographics we created to accompany the report.

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

5 Steps to Prepare for a DDoS Attack

It’s inevitable almost as death and taxes: somewhere, at some point, you will come under a DDoS attack.

C-Suite Survey: Accelerated Cloud Migrations, Lagging Security

The 2020 “C-Suite Perspectives Report on IT Security” reveals that COVID-19 was a major accelerant for organizations to quickly migrate to the cloud.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.