API Security When “Secure by Design” Isn’t Enough: Enter API Runtime Posture Management Most teams believe they have a reasonable handle on their APIs. They know what’s exposed through the gateway. There’s documentation—at least for the important services. There are security controls in place. Maybe even testing in the pipeline. Uri Dorot |May 19, 2026
Application Security The OWASP IoT Top 10 and How to Defend Against It The OWASP IoT Top 10 is a security awareness document developed by the OWASP Foundation that identifies the most critical security risks associated with Internet of Things (IoT) devices and ecosystems. Jitesh Sharma |May 14, 2026
Agentic AI Security Why AI Security Posture Management (AI SPM) Is No Longer Optional As organizations accelerate their adoption of autonomous, agent driven AI systems, a fundamental reality is emerging: AI introduces a new class of risks that evolve faster than traditional security controls can keep up. Dror Zelber |May 13, 2026
Threat Intelligence 2026 Q1 Network & Application Attack Trends The year 2025 has proven to be a watershed moment in the history of cybersecurity, a period we described as a digital Garden of Eden for threat actors. While the metaphor suggested a paradise of opportunity for our adversaries, it represented a fundamental paradigm shift for many defenders. Pascal Geenens |May 12, 2026
Application Security Neither Human Nor Bot: The AI-driven Traffic Problem For years, the fundamental question that web traffic management has been built around is a binary one: is this traffic human, or is it a bot? Dhanesh Ramachandran |May 07, 2026
Customers Top 8 Reasons Security Teams Chose Radware Over the Competition Based on customer reviews, choosing a DDoS protection solution is a consequential decision. The market is crowded with well-known names like F5, Akamai, Arbor, Cloudflare, Citrix, Cisco, and AWS, with each claiming to offer enterprise-grade protection. So how do organizations actually decide? Radware Customers |May 06, 2026
Agentic AI Security The Importance of Pre-Integrated Agentic AI Solutions – Agents and Security from the get-go In the rapidly evolving landscape of artificial intelligence, the integration of Agentic AI Protection solutions with leading AI Agent providers such as Microsoft, AWS, Google, and ChatGPT is not just a technical necessity but a strategic imperative. Dror Zelber |May 05, 2026
Application Security Post-Quantum Cryptography: What C-Level Leaders Must Do Now—Before It Becomes a Crisis Quantum computing is no longer a distant threat - it is a board-level risk with a defined timeline. Governments across North America, Europe, and the UK are already directing organizations to begin transitioning to post-quantum cryptography (PQC), with full migration expected over the next decade. Prakash Sinha |May 01, 2026
Agentic AI Security Anthropic Claude Mythos and the End of Patch Centric Security When Anthropic unveiled Claude Mythos, the cybersecurity industry fixated on the headline: thousands of zero day vulnerabilities discovered autonomously, across nearly every major OS, browser, and software stack. Dror Zelber |April 30, 2026
Agentic AI Security From Newborn Models to Autonomous Agents: Why "House Rules" Aren't Enough Think of an AI model like a newborn child. At the beginning, it lives in a controlled environment, guided entirely by its parents, learning what is allowed and what is not. These early instructions, the “house rules” shape its understanding of the world. Rotem Elharar |April 29, 2026
Agentic AI Security Anthropic Claude Mythos and the 2026 Cybersecurity Landscape The emergence of Anthropic’s Claude Mythos model could mark a pivotal shift in the cybersecurity landscape, characterized by the transition from human-led research to machine-scale operations. Pascal Geenens |April 28, 2026
DDoS Protection Application Layer DDoS in an Era Where Everything Looks Legitimate At 07:42 on a weekday morning, nothing looked wrong. Requests flowed normally. Services responded as expected. Monitoring dashboards showed green. Thirty minutes later, a public financial service supporting several million beneficiaries across EMEA was under extreme pressure from nearly 10 million encrypted requests every second. Eva Abergel |April 24, 2026