DDoS Protection 2023 Network and Application Threat Landscape Over the last few years, the network and application threat landscape evolved and accelerated significantly. Organizations had to deal with… Pascal Geenens | September 19, 2023
DDoS Protection Unravelling the DNS DDoS Threat Landscape The Domain Name System (DNS) is the backbone of the internet, translating human-readable domain names into machine-readable IP addresses. This… Pooja Gupta | September 14, 2023
DDoS Protection 5 Ways DDoS Attacks Disrupt Healthcare Services Healthcare institutions are experiencing a significant digital transformation, with a growing reliance on technology to deliver critical services and patient… More Keren | September 13, 2023
Application Security Generative AI – A Disruptive Force at the hands of Cyber attackers The world is rapidly changing. With the introduction of publicly available Generative AI tools toward the end of 2022, we… Uri Dorot | September 12, 2023
Application Protection Unmasking the Bot Threat: Exploring Bad Bot Analyzer Tool, Part 2 In the previous sections of the blog, we covered the tool itself, its technical workflow, and provided a summary of… Zaid Imam | September 7, 2023
Customers IPv6 Security Challenges for CISOs The migration from IPv4 to IPv6 is essential due to the limited availability of IP addresses in the older protocol.… Cristian Camilo Ariza Ariza | September 6, 2023
Application Delivery Why Companies Are Bringing Workloads Back On-Premise In recent years, the business landscape has witnessed a remarkable transformation with the rapid adoption of cloud computing. Cloud services… Prakash Sinha | September 5, 2023
Application Protection Unmasking the Bot Threat: Exploring Bad Bot Analyzer Tool, Part 1 Radware's Bad Bot Analyzer is an innovative tool that is available free of charge. It serves as an industry-first solution,… Zaid Imam | August 31, 2023
Application Delivery SSL Offload, let us do the work for you Did you notice that certain websites get slower when there’s a large number of people accessing them at the same… Guy Shimon | August 29, 2023
Application Protection The Importance of a High-Performance WAAP in Today’s Threat Landscape (Part 2 of 2) Your website has a guardian, a digital superhero warding off online villains. But imagine if this guardian is sluggish or… Jeremie Ohayon | August 28, 2023
Application Protection Do you know where crisis hits next? Be prepared with GSLB (Global Server Load Balancing) Did you know that in 2017 British Airways experienced a massive IT failure during one of the busiest travel weekends… Guy Shimon | August 24, 2023
Application Delivery 5 Benefits of Using Global Elastic License (GEL) In today's rapidly evolving digital landscape, where more organizations transition to the cloud and adopt automation, they face the challenge… Dalit Bar | August 23, 2023
Application Security Application Security in the Microservices Era As organizations break their applications down into microservices, leveraging containers as the perfect architecture for it, the responsibility for securing… Ben Zilberman | October 10, 2019
DDoS Protection How to Stop Disruptive Web DDoS Tsunami Attacks The cyber security world is in turmoil. A new generation of HTTPS DDoS attacks is disrupting the market, bypassing organizations'… Uri Dorot | May 9, 2023
Security How Can You Protect What You Can't See? The need for speed is at the heart of organizations’ strategic decisions about digital transformation. Faster time to market for… Ben Zilberman | January 14, 2020
DDoS 5 Steps to Prepare for a DDoS Attack It’s inevitable almost as death and taxes: somewhere, at some point, you will come under a DDoS attack. The reasons… Eyal Arazi | September 10, 2019
Security C-Suite Survey: Accelerated Cloud Migrations, Lagging Security Recently, Enterprise Management Associates (EMA) conducted a research survey for Radware of senior executives across the globe to gain a… Chris Steffen | September 15, 2020
Security The State-Sponsored Cyberthreat Landscape There is a global chess match between nation-states, businesses and the various digital assets contained within these organizations. The result… Radware | December 10, 2019
Application Protection 3 Security 'Disconnects' That Need To Be Addressed Osterman Research recently conducted an in-depth, international survey of security-focused decision makers and influencers in large organizations. Our goal was… Michael Osterman | January 27, 2021
Service Provider Getting Ready for 5G & IoT It was the best of times, it was the worst of times, it was the age of 5G networks, it… Radware | February 4, 2020
Application Security The Evolution of Application Development The evolution of application development has gone through many stages, and each has had its challenges. It started with monolithic… David Monahan | October 16, 2019
Security Here's How Bots Are Exploiting Coronavirus Fears Coronavirus is a pandemic that the world has not witnessed in quite some time. International borders are closed. Major sports… Manwendra Mishra | April 1, 2020
Application Protection Protecting APIs & Securing Applications So Business Can Thrive Happy New Year! How about we start it with a quick pulse check? Does your organization have the desired visibility… Ben Zilberman | January 20, 2021
DDoS How to Recover from a DDoS Attack They say nothing lasts forever – and neither do DDoS attacks. Recovering from a DDoS attack is no simple matter,… Eyal Arazi | November 19, 2019