• Media Coverage

    Hit men, drugs and malicious teens: the darknet is going mainstream

    Surfing the darknet — the part of the internet that lies beyond a normal web browser's reach, and is a haven for an astonishing amount of criminal commerce — has never been easier, or more popular.

    Don't Get Caught Out By Fake Hackers

    People are masquerading as hackers in order to ransom companies. Here's how to spot a phoney from the genuine article (and what to do next).

    How to keep from becoming a security statistic

    Summer travelers worry about terrorism and Zika and unrest, but maybe they should look a little closer for the real threat.

    How to spot a fake ransom attack

    Radware researcher and a former hacker Daniel Smith explains: “Distributed Denial of Service (DDoS) for Ransom attacks work by running a ‘sample’ attack on a company network while at the same time sending a note asking for payment, usually in bitcoin, by a certain date ‘or else’ they will hit the company with a much larger and more devastating attack.

    Are the utilities ready for IoT? – Part Two

    Many organisations are working towards changing their supplier contracts to include security requirements and moving the debate to more of a shared responsibility. In fact, many companies are taking this approach now regardless of the type of service the supplier is offering. Too many brands have either witnessed or experienced the consequences of being a cyber-domino whereby the poor security measures of one company bring down the networks of another.

    Are the utilities ready for IoT? – Part One

    It doesn’t matter if you are a utility company in the UK, Europe or beyond, the issues you face daily in the boardroom are the same, writes Adrian Crawley, the regional director of Northern EMEA for Radware.

    Validating Cisco's Threat-Centric Security Solutions

    We reviewed the Radware DefensePro DDoS protection technology running on the Firepower 9300 platform, verifying the solution's ability to quickly detect and mitigate DDoS attacks on services and infrastructure through behavioral traffic analysis.