3 Ways to Overcome Cybersecurity Staff Shortages in 2023 According to the report, 70% of organizations believe they do not have sufficient cybersecurity staff to be effective. And over… Eyal Arazi | May 3, 2023
Revolutionizing DNS Security: Cost-Effective Deployment of DoH for ISPs DNS over HTTPS (DoH) is a protocol that allows for DNS resolution to occur through an encrypted HTTPS connection. Unlike… Isabela Korner | March 14, 2023
Becoming a highly regarded and appreciated SOC operator — the tools you need in your toolbox So, you've recently been hired to become a SOC (security operations center) manager for a major organization. You are obviously… Dror Zelber | March 10, 2023
How Service Providers are Using Radware Kubernetes Web and API Protection (KWAAP) Validated on Red Hat OpenShift to Elevate Microservices Security Using the layered security capabilities of Red Hat OpenShift, Radware Kubernetes Web and API Protection (KWAAP) brings Radware’s carrier-grade security… Samuel Bercovici | March 1, 2023
Predictor or Pitfall? Third Party Security Evaluators The use of 3rd parties to test the cyber hygiene of business partners and vendors has become increasingly common. Howard Taylor | January 5, 2023
Why Automation is a Must Have for Disaster Recovery We have seen a spate of cloud service provider outages with overly negative economic impact. The AWS outage in December… Prakash Sinha | June 23, 2022
With Great 5G Power Comes Great Responsibility With this new infrastructure in place, services that previously could not be adopted on a large scale will now begin… Shai Haim | March 29, 2022
Automating Incident Response The classic approach, though, revolves around combining SOAR and IRP to automate routine operations and speed up incident response. David Balaban | February 22, 2022
How to protect a corporate Wi-Fi network The importance of Wi-Fi both for providing various services to customers and employees and for managing and receiving data from… David Balaban | February 2, 2022
Phantom Floods: Are Service Providers Blind to These DDoS Attacks? Phantom flood attacks and other low volume attacks are a significant security threat for service providers and their customers. Shai Haim | October 13, 2021
How DDoS Attacks Are Different for Service Providers Protecting Service provider’s large-scale network is different, most service providers implement a DDoS protection after the fact. Shai Haim | August 11, 2021
How Cloud Native Technology will Impact 5G Mobile Networks CSPs understand today that they need more from cloud. Cloud must be rebuilt to cloud-native so that they can get… Yaniv Hoffman | August 5, 2021