Application Delivery Ensuring Business Continuity: The Vital Role of Proper ADC Configuration In today's fast-paced digital landscape, the proper configuration of an Application Delivery Controller (ADC) is not just a matter of… Guy Shimon | March 28, 2024
Application Delivery Top 5 Benefits of Using Alteon VA In Public Cloud Environments Businesses are striving to find the best solutions to connect their applications to cloud environments, which promise limitless scalability, remarkable… Avi Katz | March 27, 2024
Application Protection Securing SSL/TLS Certificates: An In-Depth Look at CWAP NoKey Technology In the ever-evolving digital landscape, the importance of securing online communication cannot be overstated. Rotem Elharar | March 26, 2024
DDoS Protection Insights into a 3.5Million Request per Second Web DDoS Attack on a Leading European Bank In the realm of cybersecurity, vigilance is paramount, as evidenced by a recent incident involving a prominent European bank hit… Eva Abergel | March 22, 2024
Service Providers Protecting Network and Applications as a Managed Service Provider The lack of security expertise is forcing many enterprises to evaluate service providers (SPs) for the responsibility of protecting their… Prakash Sinha | March 21, 2024
Application Protection Bot Management Technology Landscape: A 360-degree view (Part 2) Now, in the second part of the blog series, we shift our focus to the tools used for countering bots. Amrit Talapatra | March 20, 2024
Public Cloud Protection The Significant Role of Data Visualization in Cybersecurity In this blog, I will reveal how Data Visualization plays a significant role in cybersecurity by helping users better understand… Ailin Elgart | March 19, 2024
Application Protection PCI DSS 4.0 is here. Are you ready? On March 31, 2024, we transition from PCI DSS 3.2.1 to PCI DSS 4.0. If this news surprises you and… Uri Dorot | March 14, 2024
Threat Intelligence Exploring the Future of AI in Cybersecurity: Risks and Innovations In 2023, a transformative event reshaped the technology landscape: the emergence of artificial intelligence (AI) into the mainstream. Pascal Geenens | March 13, 2024
DDoS Protection Looking for cyber-attack services? Check Anonymous Sudan’s new InfraShutdown service In January 2023, the group made its presence known by launching attacks on Denmark and Sweden, presenting themselves as pro-Muslim… Ward Wrzenski | March 12, 2024
Service Provider 5G Networks are Here to Stay - Scale Up and Stay Secure! In 2022, the global market for multi-access edge computing reached a value of USD 2.52 billion. It is projected to… Itay Raviv | March 7, 2024
Application Protection Safeguarding Against Supply Chain Attacks: A Customer's Tale of Defacement and Response. Part 2 Welcome back to the next chapter of our customer's gripping story of dealing with defacement and bouncing back. In Part… Meir Michaeli | March 6, 2024
Application Security Application Security in the Microservices Era As organizations break their applications down into microservices, leveraging containers as the perfect architecture for it, the responsibility for securing… Ben Zilberman | October 10, 2019
DDoS Protection How to Stop Disruptive Web DDoS Tsunami Attacks The cyber security world is in turmoil. A new generation of HTTPS DDoS attacks is disrupting the market, bypassing organizations'… Uri Dorot | May 9, 2023
Security How Can You Protect What You Can't See? The need for speed is at the heart of organizations’ strategic decisions about digital transformation. Faster time to market for… Ben Zilberman | January 14, 2020
DDoS 5 Steps to Prepare for a DDoS Attack It’s inevitable almost as death and taxes: somewhere, at some point, you will come under a DDoS attack. The reasons… Eyal Arazi | September 10, 2019
Security C-Suite Survey: Accelerated Cloud Migrations, Lagging Security Recently, Enterprise Management Associates (EMA) conducted a research survey for Radware of senior executives across the globe to gain a… Chris Steffen | September 15, 2020
Security The State-Sponsored Cyberthreat Landscape There is a global chess match between nation-states, businesses and the various digital assets contained within these organizations. The result… Radware | December 10, 2019
Application Protection 3 Security 'Disconnects' That Need To Be Addressed Osterman Research recently conducted an in-depth, international survey of security-focused decision makers and influencers in large organizations. Our goal was… Michael Osterman | January 27, 2021
Service Provider Getting Ready for 5G & IoT It was the best of times, it was the worst of times, it was the age of 5G networks, it… Radware | February 4, 2020
Application Security The Evolution of Application Development The evolution of application development has gone through many stages, and each has had its challenges. It started with monolithic… David Monahan | October 16, 2019
Security Here's How Bots Are Exploiting Coronavirus Fears Coronavirus is a pandemic that the world has not witnessed in quite some time. International borders are closed. Major sports… Manwendra Mishra | April 1, 2020
Application Protection Protecting APIs & Securing Applications So Business Can Thrive Happy New Year! How about we start it with a quick pulse check? Does your organization have the desired visibility… Ben Zilberman | January 20, 2021
DDoS How to Recover from a DDoS Attack They say nothing lasts forever – and neither do DDoS attacks. Recovering from a DDoS attack is no simple matter,… Eyal Arazi | November 19, 2019