The On-Prem WAF is Dead. Long Live the Cloud WAF It’s time to take a look into the application environment changes and examine whether a WAF is the best solution… Yaron Azerual | April 5, 2023
“What I Wish I Would Have Known About Cloud Security Prior to our Cloud Migration” We like to query Radware customers on an array of cybersecurity subjects because we always receive insightful, interesting and, perhaps… Radware Customers | December 15, 2022
The Multi-Cloud is The New Normal, But Creates Key Security Challenges The age of the multi-cloud is upon us, but that comes at a cost to security. In a nutshell, this… Eyal Arazi | September 21, 2022
Securing applications in the multi-cloud: Where should organizations start? The cloud represents a gamechanger in the way businesses access and use technology, but it’s also brought with it major… Radware | May 27, 2022
A New Security Approach for the New Age of Multi-Cloud Most organizations today deploy web applications across multi-cloud and hybrid environments. However, existing models for application security are obsolete and… Eyal Arazi | April 7, 2022
7 Things to Look for in a Cloud Security Service The accelerated change of both web-assets and attack vectors renders static web security solutions obsolete. Security teams need a solution… Radware | March 4, 2022
New Cloud Infrastructure in Germany Extends Data Protection Support to EU Customers With the new cloud infrastructure in Germany, Radware Bot Manager eliminates the need for data to be sent outside the… Siddharth Deb | February 16, 2022
Cloud Security Protection for Your Apps and Network Cloud security comes second to fast app delivery. Attack surface of apps has expanded with vulnerabilities in correlation with complexity. Debra Price | February 15, 2022
4 Common Cloud Vulnerabilities Which Lead to a Breach As more organizations adopt multi-cloud and hybrid cloud strategies, additional challenges and threat vectors are added. Eyal Arazi | November 15, 2021
Understanding Cloud Permissions and How to Control Excessive Permissions Key challenges of managing permissions in the cloud is that it provides additional types of permissions that are not observed… Radware | October 22, 2021
Frictionless Protection of Applications In A Cloud Motion World Cloud migration and application deployment are dynamic processes spanning over years – hybrid environments are never really static. Sharon Trachtman | September 21, 2021
Why ‘Role’ Permissions Are So Dangerous To Your Cloud Environment A key challenge facing organizations in the cloud is how to reign in excessive permissions. Benefits frequently come at a… Eyal Arazi | September 17, 2021