DDoS Chronicles

The only way to fight today’s cyber-attacks is to be prepared. Read these short articles that provide observations, explanations and information about today’s threat landscape.

The Never-Ending Hack

In 2012, Dropbox, the popular file hosting service, was the victim of a largescale cyber-attack during which attackers obtained large volumes of email and password data. It has been recently discovered that the data stolen in the 2012 breach has been leaked and that over 68 million accounts have been comprised.


September 22, 2016 03:00 PM

In the Crosshairs: Six Cyber Security Threats Gunning for Your Online Business

In today’s hyper-connected world, nearly all businesses, regardless of size orindustry, have some element of their operations based online. From the largestonline retailers and financial service companies to gaming and social mediabrands, organizations are transforming how they conduct business and havebecome increasingly dependent on network-based services.


May 31, 2016 03:00 PM

What Is Ransomware?

You are catching up on some Web surfing using your favorite mobile device, when all of a sudden everything freezes and you receive a message telling you...


April 26, 2016 03:00 PM

How Defense Messaging Can Speed up Time to Mitigate DDoS Attacks

One of the primary capabilities to consider when evaluating DDoS cyber-attack mitigation vendors is time to mitigate. Specifically, how quickly can effective protection be enabled once a DDoS attack is detected? The immediacy of DDoS mitigation is important for one very obvious reason: downtime costs companies money and many modern attacks create immediate downtime when they hit. The faster a DDoS attack can be mitigated, the faster the site is back up and the less financial impact to the company.


January 5, 2016 02:00 PM

IDC Agrees: Single Vendor Hybrid Provides Ideal Cyber-Attack Protection

A definitive trend in the cyber-security market is the movement towards “hybrid” DDoS protection solutions. In Radware’s 2014-2015 Global Network & Application Security Report, we can see that many information security practitioners have either already implemented hybrid technologies (36% of survey respondents), or plan to by the end of 2015 (48%).


January 5, 2016 02:00 PM

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Locations
Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

Get Social

Connect with experts and join the conversation about Radware technologies.

Blog
Security Research Center
CyberPedia