What Does a Windstorm in Wyoming Have to Do with Cyber Security? Natural disasters serve as excellent examples of the unforeseen consequences that a cyber-attack against infrastructure will have. Take for example Carl Herberger |February 07, 2018
A Review of the MIT EF Blockchain Presentation By now, almost everyone has heard of Bitcoin and blockchains. Mainstream news, investment platforms, Wall Street, and everyone else is David Hobbs |January 30, 2018
Taking Stock of Application-Layer Security Threats The financial services industry is, by its very nature, inherently risk adverse. The sheer volume of transactional data moving through Radware |January 11, 2018
Ransomware, Automation, and IoT Bots, Oh My! Happy New Year to all our readers! In 2017, we conducted several studies and wrote several reports on the state Radware |January 03, 2018
2017 in Review: Your Favorite Posts Another year has come and gone, full of all sorts of new cyber-attacks and vulnerabilities. Which subjects did our readers Radware |December 27, 2017
Are Your Medical Records Safe? NO. Radware’s Web Application Security Report finds security flaws in the healthcare industryWhat do healthcare institutions, insurance companies, hospitals, pharmaceuticals and Ben Zilberman |December 21, 2017
Darknet: Attacker’s Operations Room Originating from ARPANET back in the 70’s, the Darknet is essentially an overlay network, which applies strong privacy and encryption Nir Ilani |December 20, 2017
AI Considerations in Cyber Defence Automation When Apple unveiled the iPhone X, it catapulted artificial intelligence and machine learning into the limelight. Facial recognition became a Pascal Geenens |December 14, 2017
Healthcare & Web Application Security: A Prescriptive Look at Application-Layer Security Risks The healthcare sector consists of a wide number of segments: payers, such as insurance companies; providers such as hospitals and Radware |December 07, 2017
5 Questions to Ask About DDoS Pricing DDoS protection pricing is all over the map, and can get fairly complex. However, there are a few key questions Eyal Arazi |November 29, 2017
Understanding the Real Cost of a Cyber-Attack and Building a Cyber-Resilient Business Cyber-attacks are like parasites: they are not always visible, not always felt, but with plenty of potential to affect your Ben Zilberman |November 21, 2017
HTTP Attacks HTTP traffic is dominating the internet. In fact, when people are asked about the internet, they are sometimes sure the Lior Rozen |November 15, 2017