This was H1 2022: Part 3 – Beyond the War Being caught up in all the events and media attention stemming from the Russo-Ukrainian conflict, one could forget that there… Pascal Geenens | August 18, 2022
Radware Threat Researchers Live: Ep.15 In the latest episode of Radware Threat Researchers Live, Pascal Geenens and Daniel Smith discuss the following: Ransom DoSREvil vs Voice… Radware | October 28, 2021
Here’s How You Can Better Mitigate a Cyberattack Where does the attack landscape lead us into 2020? No one knows for sure, but strong indicators help Radware build… Daniel Smith | April 16, 2019
What is a Zero-Day Attack? Zero-day attacks are the latest, never-before-seen generation of attacks. They are not volumetric or detectable from a known application signature.… Radware | April 2, 2019
DDoS Protection Requires Looking Both Ways Service availability is a key component of the user experience. Customers expect services to be constantly available and fast-responding, and… Eyal Arazi | March 26, 2019
The Intersections between Cybersecurity and Diversity Cybersecurity and diversity are high-value topics that are most often discussed in isolation. Both topics resonate with individuals and organizations… Kevin Harris | March 20, 2019
IoT Expands the Botnet Universe In 2018, we witnessed the dramatic growth of IoT devices and a corresponding increase in the number of botnets and cyberattacks. Because… Radware | March 6, 2019
How Hackable Is Your Dating App? If you’re looking to find a date in 2019, you’re in luck. Dozens of apps and sites exist for this… Mike O'Malley | February 14, 2019
The Costs of Cyberattacks Are Real Customers put their trust in companies to deliver on promises of security. Think about how quickly most people tick the boxes… Radware | February 13, 2019
What Do Banks and Cybersecurity Have in Common? Everything. New cyber-security threats require new solutions. New solutions require a project to implement them. The problems and solutions seem infinite while… Radware | February 7, 2019
HTTPS: The Myth of Secure Encrypted Traffic Exposed The S in HTTPS is supposed to mean that encrypted traffic is secure. For attackers, it just means that they have… Ben Zilberman | February 5, 2019
Attackers Are Leveraging Automation Cybercriminals are weaponizing automation and machine learning to create increasingly evasive attack vectors, and the internet of things (IoT) has proven… Radware | January 31, 2019