The UK Cyber Security and Resilience Bill: A New Era of National Resilience The United Kingdom is entering a new phase in its cybersecurity strategy with the introduction of the Cyber Security and Resilience Bill (CSRB). Building on existing frameworks such as the NIS Regulations, the Telecoms Security Act, GDPR, and sector specific obligations, CSRB represents an evolution in how the UK defines and enforces cyber resilience. Dan Schnour |December 03, 2025
Preparing for the Quantum Future: Why Post-Quantum Cryptography Matters For decades, our digital world has relied on cryptographic systems like RSA and ECC to secure communications, authenticate users, and protect sensitive data. Isabela Korner |November 25, 2025
Inside the Cloudflare Global Outage: What Happened and Why a Dual Strategy Matters On November 18, 2025, a major Cloudflare outage disrupted significant parts of the global internet for several hours. Websites protected by Cloudflare began returning widespread HTTP 5xx errors. Dan Schnour |November 20, 2025
Introducing Radware’s AI-Enhanced SOC Xpert – From Recommendation to Remediation In Part 1, we explored how modern DDoS threats evolve rapidly and why traditional dashboards—though full of data—struggle to provide SOC teams with real-time context. Lena Frid |November 19, 2025
Top 5 LLM Security Risks Every Business Must Address The adoption of large language models (LLMs) is revolutionizing how businesses operate, from automating customer support to accelerating content creation and data analysis. These models offer unprecedented efficiency and personalization, giving companies a competitive edge and enhancing customer experiences. Dror Zelber |November 18, 2025
API Discovery: The First Step to Securing Your Application Ecosystem APIs are the lifeblood of modern digital infrastructure—connecting applications, services, and data across cloud-native environments. Uri Dorot |November 13, 2025
Understanding Modern Fake Account Creation Attacks Fake account creation has always been a persistent challenge for platforms with user registration workflows. Unlike login pages or transaction flows that require existing credentials, account creation workflows are intentionally open and accessible, making them ideal targets for bot attacks. Dhanesh Ramachandran |November 07, 2025
Enabling High-Performance Applications with Advanced Ingress Networking in Kubernetes This blog explores how to optimize ingress networking in Kubernetes for high-performance applications using technologies like OVS, OVS-DPDK, SR-IOV, and PCI Passthrough. Saar Meir |November 05, 2025
Language is the new interface: why prompting is becoming a core security skill In our recent post, Fighting AI with AI, we discussed why security teams must build AI literacy to stay ahead of adversaries. The next step is putting that literacy to work. Pavan Thatha |October 29, 2025
Kubernetes Secures the Cluster. Who Secures the Application? Kubernetes has become the backbone of modern IT, running millions of workloads across cloud, hybrid, and on-prem environments. It delivers scalability, agility, and resilience at a scale the traditional systems could never match. Gaurav Sethi |October 28, 2025
Inside the F5 Disclosed Breach: What We Know and How to Strengthen Your Security Posture On October 15, 2025, F5 Networks reportedly disclosed a cybersecurity incident in a Form 8-K filing with the U.S. Securities and Exchange Commission (SEC). Prakash Sinha |October 21, 2025
Radware AI Xpert: Smarter, Faster, Agentic AI Security in Action Security Operations Centers face increasing pressure as attackers move faster, using AI to orchestrate multi-vector campaigns that evolve in seconds. Dan Schnour |October 15, 2025