Out of the Shadows, Into the Network Network security is a priority for every carrier worldwide. Investments in human resources and technology solutions to combat attacks are Radware |April 09, 2019
Are Connected Cows a Hacker's Dream? Humans aren’t the only ones consumed with connected devicesthese days. Cows have joined our ranks.Believe it or not, farmers are Mike O'Malley |April 03, 2019
What is a Zero-Day Attack? Zero-day attacks are the latest, never-before-seen generation of attacks. They are not volumetric or detectable from a known application signature. Radware |April 02, 2019
DDoS Protection Requires Looking Both Ways Service availability is a key component of the user experience. Customers expect services to be constantly available and fast-responding, and Eyal Arazi |March 26, 2019
CISOs, Know Your Enemy: An Industry-Wise Look At Major Bot Threats According to a study by the Ponemon Institute in December 2018, bots comprised over 52% of all Internet traffic. While Abhinaw Kumar |March 21, 2019
The Intersections between Cybersecurity and Diversity Cybersecurity and diversity are high-value topics that are most often discussed in isolation. Both topics resonate with individuals and organizations Kevin Harris |March 20, 2019
Bots 101: This is Why We Can't Have Nice Things In our industry, the term bot applies to software applications designed to perform an automated task at a high rate Daniel Smith |March 19, 2019
Security Pros and Perils of Serverless Architecture Serverless architectures are revolutionizing the way organizations procure and use enterprise technology. This cloud computing model can drive cost-efficiencies, increase Radware |March 14, 2019
Adapting Application Security to the New World of Bots In 2018, organizations reported a 10% increase in malware and bot attacks. Considering the pervasiveness (70%) of these types of attacks reported Radware |March 07, 2019
IoT Expands the Botnet Universe In 2018, we witnessed the dramatic growth of IoT devices and a corresponding increase in the number of botnets and cyberattacks. Because Radware |March 06, 2019
The Big, Bad Bot Problem Roughly half of today’s internet traffic is non-human (i.e., generated by bots). While some are good—like those that crawl websites Ben Zilberman |March 05, 2019
Mitigating Cloud Attacks With Configuration Hardening For attackers, misconfigurations in the public cloud can be exploited for a number of reasons. Typical attack scenarios include several Radware |February 26, 2019