Understanding the threat landscape is one thing; extracting and leveraging actionable threat intelligence to reinforce an organization’s defensive posture is another. Threat intelligence empowe...
https://blog.radware.com/security/2022/06/the-four-pillars-of-a-cybersecurity-strategy-that-works/
We have seen a spate of cloud service provider outages with overly negative economic impact. The AWS outage in December 2021 disrupted Disney+, Ticketmaster, Slack and Netflix, among a host of ot...
How many of you still participate in-person meetings on a daily basis? If this question was asked before the beginning of 2020, it would have raised several eyebrows. Our working days prior to th...
A short list of the companies that have suffered recent API-related breaches are a who’s-who of the global technology brain trust: Microsoft, Venmo, Equifax, Instagram, Facebook, Amazon, PayPal...
https://blog.radware.com/security/2022/06/2022-state-of-api-security-survey/
The cybersecurity threat landscape in the first quarter of 2022 represented a mix bag of old enemies and new foes. New actors dominated the DDoS threat landscape while application security faced ...
The cloud represents a gamechanger in the way businesses access and use technology, but it’s also brought with it major implementation challenges. The most fundamental of these is simply that t...
As more businesses migrate critical resources and applications to the public cloud, attackers are adapting their tactics and techniques to match the scale of public cloud providers. Last week, th...
https://blog.radware.com/security/2022/05/radware-mitigates-1-1tbps-ddos-attack/
Managing applications as well as the network and compute infrastructure around them used to be easy. Everything sat in a private datacenter and there weren’t that many applications to begin wit...
It’s May 2020 and a large European electronic goods retailer realizes its bot problem is going from bad to worse. In a single week, its online store is hit with eight million bot visits to syst...
Most organizations today deploy web applications across multi-cloud and hybrid environments. However, existing models for application security are obsolete and no longer up to the task of providi...