The Origin of Ransomware and Its Impact on Businesses In previous articles we've mentioned how Ransomware has wreaked havoc, invading systems and putting organizations’ reputation and stability at stake. Fabio Palozza |October 04, 2018
Are Your Applications Secure? Executives express mixed feelings and a surprisingly high level of confidence in Radware’s 2018 Web Application Security Report. As we close Ben Zilberman |October 03, 2018
IoT Botnets on the Rise Over the last two years, the criminal community has shifted its focus away from exploit kits as a mean of payload Daniel Smith |October 02, 2018
Cities Paying Ransom: What Does It Mean for Taxpayers? On September 1, Ontario’s Municipal Offices experienced a cyberattack that left their computers inoperable when Malware entered its systems and David Hobbs |September 25, 2018
Don’t Let Your Data Seep Through The Cracks: Cybersecurity For the Smart Home Technology and wireless connectivity have forever changed households. While we don’t have the personal hovercrafts or jetpacks that we were Anna Convery-Pelletier |September 20, 2018
IoT, 5G Networks and Cybersecurity: Safeguarding 5G Networks with Automation and AI By 2020, Gartner says there will be 20.4 billion IoT devices. That rounds out to almost three devices per person Louis Scialabba |September 18, 2018
Adopt TLS 1.3 - Kill Two Birds with One Stone Transport Layer Security (TLS) version 1.3 provides significant business benefits by making applications more secure, improving performance and reducing latency Prakash Sinha |September 13, 2018
Defending Against the Mirai Botnet When attacks from the Mirai botnet hit the network in 2016, we all knew something was different. You could feel Ron Winward |September 12, 2018
DDoS Protection is the Foundation for Application, Site and Data Availability When we think of DDoS protection, we often think about how to keep our website up and running. While searching Daniel Lakier |September 11, 2018
Rate Limiting-A Cure Worse Than the Disease? Rate limiting is a commonly-used tool to defend against application-layer (L7) DDoS attacks. However, the shortcomings of this approach raises Eyal Arazi |September 05, 2018
The Evolution of IoT Attacks What is the Internet of Things (IoT)? IoT is the ever-growing network of physical devices with embedded technologies that connect Daniel Smith |August 30, 2018
Protecting Sensitive Data: What a Breach Means to Your Business Data breaches have made big headlines in recent years, from Target to Equifax to Hudson’s Bay Co’s Saks and Lord Mike O'Malley |August 29, 2018