The Security Vulnerabilities of Third-Party Collaboration Tools How many of you still participate in-person meetings on a daily basis?If this question was asked before the beginning of Eva Abergel |June 23, 2022
Why Inspecting Encrypted Traffic Is A Must What You Don’t See Can Harm You As we emerge from the COVID-19 lockdown, we see a rash of malicious Prakash Sinha |June 23, 2021
Por que inspecionar o tráfego criptografado é fundamental O que você não vê pode prejudicá-loConforme saímos do isolamento devido à COVID-19, vemos uma onda de ataques mal-intencionados de Prakash Sinha |June 23, 2021
The Danger of API Security Overconfidence: Four Takeaways from Radware’s 2022 State of API Security Survey A short list of the companies that have suffered recent API-related breaches are a who’s-who of the global technology brain Prakash Sinha |June 16, 2022
NIS2 – What is it and How to Comply In 2016, the European Union (EU) introduced the Network and Information Security Directive (NIS) as its first cybersecurity legislation. The Uri Dorot |June 11, 2024
From Shortage to Strength: Harnessing Automation and Algorithms to Overcome IT Security Staffing Challenges The rapidly evolving digital landscape demands robust cybersecurity measures. However, the scarcity of skilled security professionals poses a significant challenge Sharon Trachtman |June 09, 2023
How To Secure Applications At-scale From Code to Cloud Due to the pandemic, security teams are dealing with increasingly distributed environments driven by accelerated cloud adoption. Application security is Radware |June 01, 2021
Navigating the Cybersecurity Maze: Mastering False Positives with Ease Today, we are diving into how to handle false positives in cybersecurity. In this blog, we are sharing one of Rotem Elharar |July 24, 2024
How to Fight Bad Bots and Win: Radware’s New Crypto Mitigation Algorithms Facing a daily barrage of attacks by bad bots, today’s web application defenses are starting to show their age. The Neetu Singh |July 20, 2022
The Power of Actor Anomalies in Cybersecurity - Part 2 In the first part of our exploration into actor anomalies, we delved into the critical role these unique identifiers play Tomer Rozentzvaig |July 17, 2024
Cinco armadilhas comuns na proteção de aplicações Todos os anos, as empresas gastam muito dinheiro com as tecnologias de segurança mais recentes para proteger a confidencialidade dos Ben Zilberman |July 15, 2021
Five Common Pitfalls in Application Protection Every year, companies spend a lot of money on the latest security technologies to protect data confidentiality and the user Ben Zilberman |July 15, 2021