Radware Named Leader in AI Enhanced Vulnerability Detection: GigaOm Radar Report Unpacked This GigaOm Radar report examines 13 of the top application and API security solutions and compares offerings against the capabilities Ward Wrzenski |May 07, 2024
The Power of Actor Anomalies in Cybersecurity - Part 1 In the ever-evolving landscape of cybersecurity, understanding the actors involved is crucial for effective threat detection and mitigation. Whether it Tomer Rozentzvaig |April 04, 2024
Securing SSL/TLS Certificates: An In-Depth Look at CWAP NoKey Technology In the ever-evolving digital landscape, the importance of securing online communication cannot be overstated. SSL/TLS certificates play a crucial role Rotem Elharar |March 26, 2024
Bot Management Technology Landscape: A 360-degree view (Part 2) In the first part of our exploration into the Bot Management Technology Landscape, we delved into the intricacies of internet Amrit Talapatra |March 20, 2024
PCI DSS 4.0 is here. Are you ready? FIGURE 1: "V4.0"On March 31, 2024, we transition from PCI DSS 3.2.1 to PCI DSS 4.0. If this news surprises Uri Dorot |March 14, 2024
Safeguarding Against Supply Chain Attacks: A Customer's Tale of Defacement and Response. Part 2 Welcome back to the next chapter of our customer's gripping story of dealing with defacement and bouncing back. In Part Meir Michaeli |March 06, 2024
Safeguarding Against Supply Chain Attacks: A Customer's Tale of Defacement and Response. Part 1 The SituationPicture this: the Radware Emergency Response (ERT) team recently found themselves on high alert when a valued customer using Meir Michaeli |March 05, 2024
Radware Named a Leader in WAF Market in New Industry Report Radware was recently named a Leader in the Web Application Firewall (WAF) market by Quadrant Knowledge Solutions in their new Eyal Arazi |February 22, 2024
Source Blocking: Shifting from Reactive to Proactive Protection In today's complex digital landscape, characterized by undefined application perimeters and the intricacy of third-party dependencies, safeguarding your applications has Uri Dorot |February 20, 2024
Bot Management Technology Landscape: A 360-degree view (Part 1) The technology landscape is ever evolving and within it, internet bots have emerged as powerful tools that automate repetitive tasks Amrit Talapatra |February 06, 2024
Hacker Persona: From Gamer to Cybercriminal, A Natural Evolution Spurred by COVID Lockdowns Concealing myself behind multiple identities, I have been hunting cyber threats on underground platforms for several years, monitoring and interacting Arik Atar |February 01, 2024
Unmasking the Dangers of Fake Registrations by Bad Bots Fake registrations by bad bots involve the automated creation of false accounts or registrations on digital platforms. These bots, designed Neetu Singh |January 24, 2024