API Discovery: The First Step to Securing Your Application Ecosystem APIs are the lifeblood of modern digital infrastructure—connecting applications, services, and data across cloud-native environments. Uri Dorot |November 13, 2025
Understanding Modern Fake Account Creation Attacks Fake account creation has always been a persistent challenge for platforms with user registration workflows. Unlike login pages or transaction flows that require existing credentials, account creation workflows are intentionally open and accessible, making them ideal targets for bot attacks. Dhanesh Ramachandran |November 07, 2025
Enabling High-Performance Applications with Advanced Ingress Networking in Kubernetes This blog explores how to optimize ingress networking in Kubernetes for high-performance applications using technologies like OVS, OVS-DPDK, SR-IOV, and PCI Passthrough. Saar Meir |November 05, 2025
Language is the new interface: why prompting is becoming a core security skill In our recent post, Fighting AI with AI, we discussed why security teams must build AI literacy to stay ahead of adversaries. The next step is putting that literacy to work. Pavan Thatha |October 29, 2025
Kubernetes Secures the Cluster. Who Secures the Application? Kubernetes has become the backbone of modern IT, running millions of workloads across cloud, hybrid, and on-prem environments. It delivers scalability, agility, and resilience at a scale the traditional systems could never match. Gaurav Sethi |October 28, 2025
Inside the F5 Disclosed Breach: What We Know and How to Strengthen Your Security Posture On October 15, 2025, F5 Networks reportedly disclosed a cybersecurity incident in a Form 8-K filing with the U.S. Securities and Exchange Commission (SEC). Prakash Sinha |October 21, 2025
Radware AI Xpert: Smarter, Faster, Agentic AI Security in Action Security Operations Centers face increasing pressure as attackers move faster, using AI to orchestrate multi-vector campaigns that evolve in seconds. Dan Schnour |October 15, 2025
API Security in the Cloud: Operationalizing NIST SP 800-228 with Radware – Part 2 How Radware empowers enterprises to adopt and scale NIST’s API security guidelines across cloud-native environments. Jeremie Ohayon |October 08, 2025
Enabling User Autonomy Without Risk - Balancing Flexibility with Control Exploring how our portal delivers a flexible experience and empowers users take meaningful actions - while maintaining full control over their journey. Linoy Moallem |October 02, 2025
Fighting AI with AI: Why IT Security Teams Must Upskill Now Attackers aren’t standing still. They’re already using AI to scale their capabilities—creating polymorphic malware that evades traditional defenses and crafting phishing lures so convincing that even the most cautious users might click. Pavan Thatha |October 01, 2025
The Business Impact of Bot Attacks: KPIs that matter to Leaders in the current Digital Ecosystem Over the past decade or so, there has been a significant increase in automated bot traffic that has completely reshaped the existing digital landscape. Today, studies estimate that more than half of the traffic is generated by bots. Karthik Raju |September 19, 2025
The Security Risks of GraphQL APIs (And How to Mitigate Them) Have you ever wondered if your API security strategy is ready for the unique risks introduced by GraphQL? Uri Dorot |September 17, 2025