Bot Attacks Beware: The Power of Radware's Bad Bot Vulnerability Scanner What is Bot Vulnerability ScannerRadware's Bad Bot Vulnerability Scanner (BVS) is a free service designed to evaluate the security of Zaid Imam |October 18, 2023
MSSP on the Rise As I delved into the insights presented in the new "Security as a Service 2023" report, I could not help Marius Baczynski |October 17, 2023
Securing On-Premises Apps in a Cloud-First World: The SecurePath Advantage In today's dynamic business landscape, as organizations increasingly migrate their applications and workloads to the cloud, some still maintain on-premises Dalit Bar |October 05, 2023
The Dark Side of Microservices: How to Brighten it With Next Gen WAAP Hello and welcome back to my blog series on the dark side of microservices. In the previous blog, we delved Tomer Rozentzvaig |September 27, 2023
The Role of App Protection in Identity-Centric Security "Identity as a perimeter" is a concept in cybersecurity that represents a shift in the traditional approach to network and Prakash Sinha |September 20, 2023
Generative AI – A Disruptive Force at the hands of Cyber attackers The world is rapidly changing. With the introduction of publicly available Generative AI tools toward the end of 2022, we Uri Dorot |September 12, 2023
Unmasking the Bot Threat: Exploring Bad Bot Analyzer Tool, Part 2 In the previous sections of the blog, we covered the tool itself, its technical workflow, and provided a summary of Zaid Imam |September 07, 2023
Unmasking the Bot Threat: Exploring Bad Bot Analyzer Tool, Part 1 What is Bad Bot AnalyzerRadware's Bad Bot Analyzer is an innovative tool that is available free of charge. It serves Zaid Imam |August 31, 2023
The Importance of a High-Performance WAAP in Today’s Threat Landscape (Part 2 of 2) Part 2Your website has a guardian, a digital superhero warding off online villains. But imagine if this guardian is sluggish Jeremie Ohayon |August 28, 2023
Importance of a High-Performance WAAP in today’s Threat Landscape (Part 1 of 2) Part 1In today's digital landscape, the rise of increasingly sophisticated and frequent attacks, including ransomware, DDoS attacks, credential stuffing, multiple Jeremie Ohayon |August 11, 2023
The Dark Side of Microservices: How to Protect Your Data from Breach Attacks Hello and welcome back to my blog series on the dark side of microservices. In the previous blog we discussed Tomer Rozentzvaig |August 07, 2023
The Impact of Bots on Airline and Travel Industries Bad bot activities harm the travel industry in a multitude of waysAirlines and travel industry operators, badly impacted during the Siddharth Deb |August 03, 2023