Organizations Experience Multi-Cloud ‘Whiplash’ as Application Threats Grow Whereas 2022 was characterized by the rapid expansion of organizations to the multi-cloud, 2023 has been characterized by consolidation of Eyal Arazi |November 09, 2023
Foundations For a Robust On-Prem and In-the-Cloud Security and DR Strategy Modern applications are composite, distributed, and potentially deployed in multiple cloud and hybrid environments. This architectural complexity increases their vulnerability Prakash Sinha |November 02, 2023
The Client-Side Seven: Make Sure Your Security Solution Addresses Them All It is not uncommon for browser-side security to receive limited attention from IT teams when there are so many types Uri Dorot |October 24, 2023
How Bot Manager Protects E-Commerce from ATO Attacks on Black Friday Black Friday, the day after Thanksgiving, is one of the most eagerly awaited shopping events of the year, marking the Neetu Singh |October 23, 2023
Bot Attacks Beware: The Power of Radware's Bad Bot Vulnerability Scanner, Part 2 Impact of Generation Bot AttackPerforming attacks on a website can have diverse impacts, depending on the intent and severity of Zaid Imam |October 19, 2023
Bot Attacks Beware: The Power of Radware's Bad Bot Vulnerability Scanner What is Bot Vulnerability ScannerRadware's Bad Bot Vulnerability Scanner (BVS) is a free service designed to evaluate the security of Zaid Imam |October 18, 2023
MSSP on the Rise As I delved into the insights presented in the new "Security as a Service 2023" report, I could not help Marius Baczynski |October 17, 2023
Securing On-Premises Apps in a Cloud-First World: The SecurePath Advantage In today's dynamic business landscape, as organizations increasingly migrate their applications and workloads to the cloud, some still maintain on-premises Dalit Bar |October 05, 2023
The Dark Side of Microservices: How to Brighten it With Next Gen WAAP Hello and welcome back to my blog series on the dark side of microservices. In the previous blog, we delved Tomer Rozentzvaig |September 27, 2023
The Role of App Protection in Identity-Centric Security "Identity as a perimeter" is a concept in cybersecurity that represents a shift in the traditional approach to network and Prakash Sinha |September 20, 2023
Unmasking the Bot Threat: Exploring Bad Bot Analyzer Tool, Part 2 In the previous sections of the blog, we covered the tool itself, its technical workflow, and provided a summary of Zaid Imam |September 07, 2023
Unmasking the Bot Threat: Exploring Bad Bot Analyzer Tool, Part 1 What is Bad Bot AnalyzerRadware's Bad Bot Analyzer is an innovative tool that is available free of charge. It serves Zaid Imam |August 31, 2023