The Rise of AI-Driven Cyber Attacks: A New Challenge for Service Providers In today’s cybersecurity threat landscape, attackers are increasingly using AI tools to create sophisticated and adaptive attack vectors against service Prakash Sinha |September 06, 2024
Protecting Network and Applications as a Managed Service Provider The lack of security expertise is forcing many enterprises to evaluate service providers (SPs) for the responsibility of protecting their Prakash Sinha |March 21, 2024
3 Ways to Overcome Cybersecurity Staff Shortages in 2023 Cybersecurity staff and skills shortages have been consistent trends over the past few years. According to the (ISC2) 2022 Cybersecurity Eyal Arazi |May 03, 2023
Revolutionizing DNS Security: Cost-Effective Deployment of DoH for ISPs DNS over HTTPS (DoH) is a protocol that allows for DNS resolution to occur through an encrypted HTTPS connection. Unlike Isabela Korner |March 14, 2023
Becoming a highly regarded and appreciated SOC operator — the tools you need in your toolbox So, you've recently been hired to become a SOC (security operations center) manager for a major organization. You are obviously Dror Zelber |March 10, 2023
How Service Providers are Using Radware Kubernetes Web and API Protection (KWAAP) Validated on Red Hat OpenShift to Elevate Microservices Security It would be difficult to find a technology sector that has gone through as many transformations as the service provider Samuel Bercovici |March 01, 2023
Predictor or Pitfall? Third Party Security Evaluators In case you haven’t heard, the use of 3rd parties to test the cyber hygiene of business partners and vendors Howard Taylor |January 05, 2023
Why Automation is a Must Have for Disaster Recovery We have seen a spate of cloud service provider outages with overly negative economic impact. The AWS outage in December Prakash Sinha |June 23, 2022
With Great 5G Power Comes Great Responsibility We all know the phrase, “With great power comes great responsibility.” Made famous through Spiderman’s comics and feature films, this Shai Haim |March 29, 2022
Automating Incident Response The ongoing growth of enterprise IT and information security infrastructure calls for monitoring its security, managing incidents via specialized Security David Balaban |February 22, 2022
How to protect a corporate Wi-Fi network Initially, the use of Wi-Fi networks in companies was restricted to providing convenient Internet access at halls or conference rooms. David Balaban |February 02, 2022
Phantom Floods: Are Service Providers Blind to These DDoS Attacks? The Data Growth Effect It’s no secret that we consume more data than ever, according to the IDC report in the nex Shai Haim |October 13, 2021