Ad Title: C-Suite Report 2017 By kaitlynm June 14, 2017 1832 kaitlynm Related Articles DDoS Protection We Shipped to Production with Solid.js – A Dev Experience About two months ago, we were tasked with building a new feature in our system. It wasn't overly complex, but it wasn’t trivial either. This feature required its own backend service, and on the frontend side, we wanted to keep things modular and lightweight. Yonatan Snir |July 21, 2025 Application Protection Browser Anomaly Detection Module: A Technical Overview In our previous blogs, we discussed the overview of machine learning approaches used in Radware Bot Manager and delved into an anomaly detection-based technique for enhancing bot detection. Rakesh Thatha |December 23, 2024 Application Protection Advanced Attacks on Embedded Gen AI Tools and Gen AI Apps – What to Watch For Yes, another blog article about AI and cybersecurity… but it’s a topic that remains crucial. In this article, we’ll explore how generative AI (Gen AI) tools create new attack surfaces and are susceptible to various types of cyber threats. Uri Dorot & Pavan Thatha |December 04, 2024
DDoS Protection We Shipped to Production with Solid.js – A Dev Experience About two months ago, we were tasked with building a new feature in our system. It wasn't overly complex, but it wasn’t trivial either. This feature required its own backend service, and on the frontend side, we wanted to keep things modular and lightweight. Yonatan Snir |July 21, 2025
Application Protection Browser Anomaly Detection Module: A Technical Overview In our previous blogs, we discussed the overview of machine learning approaches used in Radware Bot Manager and delved into an anomaly detection-based technique for enhancing bot detection. Rakesh Thatha |December 23, 2024
Application Protection Advanced Attacks on Embedded Gen AI Tools and Gen AI Apps – What to Watch For Yes, another blog article about AI and cybersecurity… but it’s a topic that remains crucial. In this article, we’ll explore how generative AI (Gen AI) tools create new attack surfaces and are susceptible to various types of cyber threats. Uri Dorot & Pavan Thatha |December 04, 2024