Protecting Applications in a Serverless Architecture Serverless architectures are revolutionizing the way organizations procure and use enterprise technology. Until recently, information security architecture was relatively simple; Ben Zilberman |November 08, 2018
Credential Stuffing Campaign Targets Financial Services Over the last few weeks, Radware has been tracking a significant Credential Stuffing Campaign targeting the financial industry in the Daniel Smith |October 23, 2018
Are Your Applications Secure? Executives express mixed feelings and a surprisingly high level of confidence in Radware’s 2018 Web Application Security Report. As we close Ben Zilberman |October 03, 2018
Don’t Let Your Data Seep Through The Cracks: Cybersecurity For the Smart Home Technology and wireless connectivity have forever changed households. While we don’t have the personal hovercrafts or jetpacks that we were Anna Convery-Pelletier |September 20, 2018
DDoS Protection is the Foundation for Application, Site and Data Availability When we think of DDoS protection, we often think about how to keep our website up and running. While searching Daniel Lakier |September 11, 2018
Consequences of Connection – How Mobile Security Threats Can Reach the IoT Does mobile mean a handheld device in today’s world? Not necessarily. The term ‘mobile’ often applies to a phone or Carl Herberger |June 12, 2014
A Snapshot of DDoS Regulations: 6 Protection Initiatives In the first four months of 2014, news reports have regularly detailed cyber-attacks that have affected victims ranging from small Carl Herberger |May 08, 2014
Why Cyber Attackers are Still Defeating Your Network Security Nearly, two years ago I questioned the myth: does size really matter? and now it’s time to revisit the issue Ron Meyran |May 07, 2014
Was NATO Hit by a DNS Attack? The latest developments in the Russia-Ukraine cyberwar battle have garnered huge media attention. It was also recently revealed that the Werner Thalmeier |March 24, 2014
Distinguish between legitimate users and attackers – The secret sauce of DDoS protection Distributed Denial of Service (DDoS) is unique in the sense that these attacks actually consist of many legitimate individual requests. Ronen Kenig |June 18, 2013
Security Week Article: Next Generation Mobile Networks Come with Next Generation Security Threats This past weekend, Security Week ran a byline I wrote regarding Long Term Evolution (LTE).Although this brings the promise of Avi Chesla |June 11, 2013
When Servers Attack Your Bank: The Rise of Server Botnets Imagine the following scenario: You’re a hosting company and you receive a call from one of the largest banks in Matan Atad |February 19, 2013