DDoS Protection Inside AI SOC Xpert - Enhanced Security, Human-Controlled Radware’s mitigation is known for being fast and fully automated, requiring no operator intervention. While our touchless mitigation is widely recognized for its strong performance across the industry, some highly sophisticated attacks may still require SOC attention. Inbal Reuven |March 25, 2026
AI and User Experience Designing for the Security Journey, Not Just the Security Task In cybersecurity, we often talk about "the next alert" or "the next policy decision”, as if security work is a series of isolated, disconnected moments. Linoy Moallem |March 24, 2026
Application Protection Beyond Traditional Defenses: How Positive Protection Defeats Randomized HTTPS Flood Attacks The cybersecurity landscape has witnessed a dramatic evolution in DDoS attack sophistication, with threat actors deploying increasingly complex strategies to bypass traditional security measures. Boris Melnik |March 23, 2026
Agentic AI Security The Agentic Web Is Here — Are we ready for it? The Internet as we know it is seeing a massive change. Applications have sprinted from Web to APIs to be AI-powered - and are now transforming into being AI Agents & Autonomous AI Applications, meaning that the Web Economy is now transforming into an Agentic Economy. Karthik Raju |March 19, 2026
Agentic AI Security Why Agentic AI Is More Dangerous Than Traditional LLMs: Understanding Autonomy Risk Traditional LLMs generate text; Agentic AI generates consequences. The leap from predictive responses to autonomous action changes the risk equation dramatically. Dror Zelber |March 18, 2026
Agentic AI Security Understanding AI Agents - The Next Wave of Automated Internet Activity Artificial intelligence is reshaping not only what software can do, but how it operates across the internet. While in the recent past, AI’s most visible impact on web activity came in the form of AI crawlers that collected and indexed content at scale for model training, a more complex shift is underway. Dhanesh Ramachandran |March 17, 2026
DDoS Protection AI Driven DDoS Mitigation - From Detection to Autonomous Remediation At 02:17 AM, the dashboard turns red. Traffic is climbing fast. SYN rates spike. A few seconds later, HTTP requests surge. Then TLS handshakes begin to exhaust CPU. The alerts are accurate. The detection engine did its job. Itay Raviv |March 11, 2026
DDoS Protection From manual firefighting to unified, automated Web DDoS protection Web DDoS is rarely “just” a security problem. If you run a digital business, you’ve probably seen how Layer 7 attacks show up in real life: alerts start flying, people jump into a war room, someone starts tweaking mitigations by hand, and every minute of uncertainty puts uptime, customer experience, and revenue at risk. Prakash Sinha |March 09, 2026
Application Protection Best Practices for managing Kubernetes environment in Web-DDoS attacked environments – Part1 In today’s cloud‑native era, distinguishing between genuine user growth and malicious Web DDoS surges is critical. When Auto-Scaling Lies: Diagnosing False Demand in Kubernetes During Web DDoS would be a disaster. Nithin Rudraswamy |March 04, 2026
DDoS Protection Radware Redefines Web DDoS Protection With No Decryption Defense And Maximum Flexibility In the evolving landscape of Web DDoS attacks, one challenge has remained constant. Encrypted traffic has become the primary vehicle for attackers, yet most cloud based defenses still rely on TLS decryption to see what is happening inside the flow. Eva Abergel |March 03, 2026
Application Protection Runtime Security in an AI-Accelerated World The release of Claude Code Security triggered headlines about disruption across the cybersecurity market. Analysts questioned whether traditional security categories were at risk, and public markets reacted quickly. Gabi Malka |February 25, 2026
Agentic AI Security How Effective Is Radware’s AI Agent Protection Against Indirect Prompt Injection? As autonomous AI agents rapidly enter business workflows, security teams face a new and often overlooked threat: indirect prompt injection (IPI). Dror Zelber |February 18, 2026