What Can We Learn About Cybersecurity from the Challenger Disaster? Everything. Understanding the potential threats that your organization faces is an essential part of risk management in modern times. It involves… Radware | December 5, 2018
Protecting Applications in a Serverless Architecture Serverless architectures are revolutionizing the way organizations procure and use enterprise technology. Until recently, information security architecture was relatively simple;… Ben Zilberman | November 8, 2018
Protecting Sensitive Data: A Black Swan Never Truly Sits Still The black swan - a rare and unpredictable event notorious for its ability to completely change the tides of a… Mike O'Malley | October 10, 2018
Protecting Sensitive Data: The Death of an SMB True or False? 90% of small businesses lack any type of data protection for their company and customer information. The… Mike O'Malley | September 26, 2018
Are Application Testing Tools Still Relevant with Self Learning WAFs? We all want to secure our applications. This task is becoming harder by the day as our applications constantly change… Ben Zilberman | August 15, 2018
Access to Applications Based on a « Driving License » Model More and more countries are modifying their policies with a new “driving license” model. With a classic license model, drivers… Thomas Gobet | July 18, 2018
WAFs Should Do A Lot More Against Current Threats Than Covering OWASP Top 10 Looking in the rearview mirror The application threat landscape has rapidly evolved. For years, users consumed applications over the internet… Ben Zilberman | July 12, 2018
Building Tier 1 IP Transit – What’s Involved and Why Do It? Not all internet connectivity is created equal. Many Tier 2 and Tier 3 ISPs, cloud service providers and data integrators… Richard Cohen | July 11, 2018
Orchestrating Flows for Cyber There is a great scene in the movie Victor, Victoria, where the character played by James Garner decides it’s time… Edward G. Amaroso | January 24, 2018
Marrying the Business Need With Technology, Part 3: Re-aggregating the Tools In part one of this blog series we discussed how there is oftentimes a lack of knowledge when it comes… Daniel Lakier | January 18, 2018
Application Delivery and Application Security Should be Combined Most businesses have multi-function printers that can fax, scan, and copy. In our roles, we are multi-functional as well. A… Frank Yue | January 17, 2018
Taking Stock of Application-Layer Security Threats The financial services industry is, by its very nature, inherently risk adverse. The sheer volume of transactional data moving through… Radware | January 11, 2018