MSSPs: You’re Missing Revenue Right in Front of You Let’s be real - connectivity alone isn’t paying like it used to. But here’s the thing: every fiber link you deliver is a missed security upsell - unless you turn it into a secure link. Prakash Sinha |July 31, 2025
ATO Attack Mitigation: How Radware Bot Manager Blocked a Massive Attack Campaign The combination of seamless user experiences and increasing consumer confidence in online transactions has enabled the digital economy to reach unprecedented heights, with millions of consumers adopting online platforms for their shopping or financial needs. Dhanesh Ramachandran |July 30, 2025
CitrixBleed 2 Hits Again - Why Now Is the Moment to Break Up with NetScaler Another month, another Citrix security crisis. On June 17, 2025, Citrix disclosed two new critical vulnerabilities in its NetScaler ADC and Gateway platforms. Prakash Sinha |July 29, 2025
Understanding BOLA: One of the Most Common and Dangerous API Business Logic Security Risks In the ever-evolving landscape of application security, API business logic vulnerabilities have become a growing concern - especially as digital experiences rely more heavily on data-rich, interconnected services. Uri Dorot |July 24, 2025
Kernel-Level Defense: How Radware Uses eBPF to Stop Volumetric Web DDoS Attacks Web DDoS attacks have evolved into high-rate, Layer 7 floods generating tens of millions of legitimate-looking HTTP requests per second aiming to exhaust application resources and degrade its availability. Alexander Manilov |July 17, 2025
API Security in the Cloud: What CISOs Need to Know About NIST SP 800-228 – Part 1 In today’s cloud-first enterprise landscape, Application Programming Interfaces (APIs) are the backbone of digital transformation, enabling service connectivity, innovation, and customer engagement. Jeremie Ohayon |July 16, 2025
Complementing Attestation with Behavioural Anomaly Detection in Mobile Applications With the rapid rise of AI-driven tools bots are no longer simple scripts, they’ve evolved into sophisticated agents capable of closely imitating human behavior. Rakesh Thatha |July 09, 2025
OTP Bots: The New Generation of Account Takeover Attacks Multi-factor authentication (MFA) has long been considered an effective way to secure user accounts and neutralize credential-based attacks. Many organizations have invested heavily in adding a second factor of authentication such as SMS or e-mail-based one-time passwords (OTP) and authenticator apps. Dhanesh Ramachandran |June 25, 2025
Application Security Is Falling Behind: What Radware’s New Report Reveals Radware’s latest research, conducted with Osterman Research, paints a sobering picture of the current state of application security. Dan Schnour |June 16, 2025
One Control, Multiple Protection - Meet Radware’s new Security Policy Templates Today, many organizations face many ongoing cyber threats, making efficient security management more critical than ever. Inbal Reuven |June 10, 2025
Fortifying the Digital Frontier: Radware’s Multi-Layered Bot Defence Strategy In the current digital landscape, enterprises face escalating challenges due to the widespread use of automated bots. These bots, ranging from simple scripts to advanced malicious programs, are employed in activities such as credential stuffing, data scraping, and orchestrated botnet attacks. Netravati Hegadi |June 04, 2025
Financial Services in 2025: A Growing Target for Complex Cyber Threats The Financial Services Industry remains the most targeted vertical in the global threat landscape, facing sustained and evolving cyberattacks. Dan Schnour |May 28, 2025