Ukraine’s Response to Cyber Threats a Model in DDoS Prevention With the disruption, loss of life and heartbreaking images that the Russia-Ukraine conflict has produced, it is easy to overlook… Julie Igorevna | November 18, 2022
Bot Manager vs. WAF: Why You Actually Need Both Over 50% of web traffic is comprised of bots, and 89% of organizations have suffered attacks against web applications. Websites… Radware | February 8, 2022
7 Capabilities Every Web Application Firewall Should Provide Here are 7 characteristics to look for when evaluating a WAF. Web application protection that automatically adapts to application changes… Radware | November 5, 2021
Radware is named a Customer’s Choice in the 2021 Gartner Peer Insights We are proud to share that Radware is named a Customer’s Choice in the 2021 Gartner Peer Insights ‘Voice of… Radware | April 13, 2021
Vulnerable Voting Infrastructure and the Future of Election Security As the United States prepares for the 2020 presidential election, there is concern regarding the vulnerability of the country’s voting… Radware | July 2, 2020
How COVID-19 Changed our Sales Enablement – for Good The COVID-19 pandemic challenged us to strengthen communications and transition engagements to the virtual world. Learn how we mastered virtual… Ron Meyran | July 1, 2020
How to (Securely) Share Certificates with Your Cloud Security Provider Businesses today know they must handle sensitive data with extra care. But evolving cyber threats combined with regulatory demands can… Ben Zilberman | May 23, 2019
Credential Stuffing Campaign Targets Financial Services Over the last few weeks, Radware has been tracking a significant Credential Stuffing Campaign targeting the financial industry in the… Daniel Smith | October 23, 2018
Consolidation in Consumer Products: Could it Solve the IoT Security Issues? In 2003, I went to Zermatt, Switzerland to go snowboarding under the Matterhorn. We had an eclectic group of people… David Hobbs | October 9, 2018
Security Risks: How ‘Similar-Solution’ Information Sharing Reduces Risk at the Network Perimeter We live in a connected world where we have access to several tools to assist in finding any information we… Thomas Gobet | August 23, 2018
Web Application Security in a Digitally Connected World Apps control our lives today. We pay our bills, do our shopping, communicate with our doctors, buy our groceries, order… Ben Zilberman | November 14, 2017
Outbound SSL Solutions Protect Assets in the Wild Businesses need to protect their assets when they are within their protective infrastructure AND when they are actively exposed or… Frank Yue | August 22, 2017