“What I Wish I Would Have Known About Cloud Security Prior to our Cloud Migration” We like to query Radware customers on an array of cybersecurity subjects because we always receive insightful, interesting and, perhaps… Radware Customers | December 15, 2022
The Danger of API Security Overconfidence: Four Takeaways from Radware’s 2022 State of API Security Survey A short list of the companies that have suffered recent API-related breaches are a who’s-who of the global technology brain… Prakash Sinha | June 16, 2022
4 Assumptions Preventing Effective API Protection API traffic has tripled in growth compared to the overall API traffic. Here are 4 common misconceptions companies have about… Yaron Azerual | February 23, 2022
Log4Shell: Critical log4j Vulnerability The Apache Foundation released log4j version 2.15.0 as an emergency update for a critical vulnerability in the log4j2 library Pascal Geenens | December 14, 2021
Clouds and Edges Lead to New Security Challenges in 2021 This massive shift to the clouds and edges will continue through 2021 and beyond, and have a major effect on… Radware | January 6, 2021
Creating a Secure Climate for your Business Today's IT landscape looks drastically different than it did a few years ago. Networks are more digitized and complex due… Yaniv Hoffman | February 5, 2020
Microservice Architectures Challenge Traditional Security Practices Microservice architectures meet organizations’ need for speed, but the tradeoff is the introduction of new security challenges. Radware | January 22, 2020
Threats on APIs and Mobile Applications Web Application Programming Interfaces, or Web APIs, are essential building blocks of our digital lives. Pascal Geenens | August 20, 2019
4 Emerging Challenges in Securing Modern Applications Modern applications are difficult to secure. Whether they are web or mobile, custom developed or SaaS-based, applications are now scattered… Radware | May 1, 2019
Bot Management: A Business Opportunity for Service Providers Over half of all internet traffic is generated by bots — some legitimate, some malicious. These “bad” bots are often… Radware | April 30, 2019
How to Prevent Real-Time API Abuse The widespread adoption of mobile and IoT devices, and increased use of cloud systems are driving a major change in… Radware | April 18, 2019
Are Your DevOps Your Biggest Security Risks? We have all heard the horror tales: a negligent (or uniformed) developer inadvertently exposes AWS API keys online, only for… Eyal Arazi | March 13, 2019