Enabling User Autonomy Without Risk - Balancing Flexibility with Control Exploring how our portal delivers a flexible experience and empowers users take meaningful actions - while maintaining full control over their journey. Linoy Moallem |October 02, 2025
Fighting AI with AI: Why IT Security Teams Must Upskill Now Attackers aren’t standing still. They’re already using AI to scale their capabilities—creating polymorphic malware that evades traditional defenses and crafting phishing lures so convincing that even the most cautious users might click. Pavan Thatha |October 01, 2025
The Business Impact of Bot Attacks: KPIs that matter to Leaders in the current Digital Ecosystem Over the past decade or so, there has been a significant increase in automated bot traffic that has completely reshaped the existing digital landscape. Today, studies estimate that more than half of the traffic is generated by bots. Karthik Raju |September 19, 2025
The Security Risks of GraphQL APIs (And How to Mitigate Them) Have you ever wondered if your API security strategy is ready for the unique risks introduced by GraphQL? Uri Dorot |September 17, 2025
The Polite Knock or the Broken Lock? Navigating the Grayscale World of AI Bots The age of generative AI is upon us, and with it comes a new and powerful wave of automated Bots. Rakesh Thatha |September 09, 2025
AI Meets Compliance: Why the EU AI Act Matters to Every Organization Adopting AI AI is quickly becoming core to business operations. Organizations across sectors are adopting AI to improve decision-making, automate workflows, and strengthen cybersecurity. Dan Schnour |August 13, 2025
We Used to Read the Manual - Now, We Just Ask Let’s be honest, traditional user guides often feel like a maze. You're searching for one specific answer, flashlight in hand, only to end up bumping into walls of text, navigating loops of cross-references, and questioning your life choices somewhere around Section 14.3.2. Dalit Bar |August 12, 2025
MSSPs: You’re Missing Revenue Right in Front of You Let’s be real - connectivity alone isn’t paying like it used to. But here’s the thing: every fiber link you deliver is a missed security upsell - unless you turn it into a secure link. Prakash Sinha |July 31, 2025
ATO Attack Mitigation: How Radware Bot Manager Blocked a Massive Attack Campaign The combination of seamless user experiences and increasing consumer confidence in online transactions has enabled the digital economy to reach unprecedented heights, with millions of consumers adopting online platforms for their shopping or financial needs. Dhanesh Ramachandran |July 30, 2025
CitrixBleed 2 Hits Again - Why Now Is the Moment to Break Up with NetScaler Another month, another Citrix security crisis. On June 17, 2025, Citrix disclosed two new critical vulnerabilities in its NetScaler ADC and Gateway platforms. Prakash Sinha |July 29, 2025
Understanding BOLA: One of the Most Common and Dangerous API Business Logic Security Risks In the ever-evolving landscape of application security, API business logic vulnerabilities have become a growing concern - especially as digital experiences rely more heavily on data-rich, interconnected services. Uri Dorot |July 24, 2025
Kernel-Level Defense: How Radware Uses eBPF to Stop Volumetric Web DDoS Attacks Web DDoS attacks have evolved into high-rate, Layer 7 floods generating tens of millions of legitimate-looking HTTP requests per second aiming to exhaust application resources and degrade its availability. Alexander Manilov |July 17, 2025