Security Impacting Humans: Fingerprinting vs. CAPTCHA As all applications need to be both secured and fast, the industry moves towards mitigating bad bots. As nearly 25% Thomas Gobet |June 13, 2018
Cybersecurity & Customer Experience: Embrace Technology and Change To Earn A Customer’s Loyalty Consumers demand a secure, world-class experience, but when organizations deploy new applications and services to deliver that experience, customer data Anna Convery-Pelletier |June 12, 2018
8 Questions to Ask in DDoS Protection As DDoS attacks grow more frequent, more powerful, and more sophisticated, many organizations turn to DDoS mitigation providers to protect Eyal Arazi |June 07, 2018
2018: Snapshot of the Most Important Worldwide Cybersecurity Laws, Regulations, Directives and Standards Are you out of breath from the breakneck pace of cyberattacks since the start of 2018? Throughout the world, nearly Carl Herberger |June 05, 2018
5 Must-Have DDoS Protection Technologies Distributed Denial of Service (DDoS) attacks have entered the 1 Tbps DDoS attack era. However, Radware research shows that DDoS Eyal Arazi |May 30, 2018
Detecting Malware/APT Through Automatic Log Analysis Legacy perimeter security mechanisms can be evaded very easily. It’s disappointing, but it’s true. Innovatively-designed malware and APTs have the Fabio Palozza |May 23, 2018
Federal CISO: Superhero Needed A famous leadership coach said, “Only Superman can leap tall buildings in a single bound, the rest of us must Carl Herberger |May 16, 2018
Nigelthorn Malware Abuses Chrome Extensions to Cryptomine and Steal Data Individual research contributed by Adi Raff and Yuval Shapira.On May 3, 2018, Radware’s cloud malware protection service detected a zero-day Radware |May 10, 2018
6 Must-Have Metrics in Your SLA Your Service Level Agreement (SLA) is a crucial component of DDoS defenses. It is your contractual guarantee outlining what your Eyal Arazi |May 09, 2018
The 7 Craziest IoT Device Hacks Internet of Things (IoT) botnets have forever changed cyber-security. When an IoT botnet - which is a group of internet-connected Mike O'Malley |May 08, 2018
High-Performance Visibility into SSL/TLS Traffic Protection of your business’s confidential information and prevention of data breaches are crucial to supporting successful business operations. This necessarily Fabio Palozza |May 02, 2018
New Threat Landscape Gives Birth to New Way of Handling Cyber Security With the growing online availability of attack tools and services, the pool of possible attacks is larger than ever. Let’s Carl Herberger |May 01, 2018