How Cyberattacks Directly Impact Your Brand: New Radware Report

How Cyberattacks Directly Impact Your Brand: New Radware Report

Whether you’re an executive or practitioner, brimming with business acumen or tech savviness, your job is to preserve and grow your company’s brand. Brand equity relies heavily on customer trust, which can take years to build and only moments to demolish. 2018’s cyber threat landscape demonstrates this clearly; the delicate ... Read More
Protecting Applications in a Serverless Architecture

Protecting Applications in a Serverless Architecture

Serverless architectures are revolutionizing the way organizations procure and use enterprise technology. Until recently, information security architecture was relatively simple; you built a fortress around a server containing sensitive data, and deployed security solutions to control the flow of users accessing and leaving that server. But how do you secure ... Read More
Are Your Applications Secure?

Are Your Applications Secure?

Executives express mixed feelings and a surprisingly high level of confidence in Radware’s 2018 Web Application Security Report. As we close out a year of headline-grabbing data breaches (British Airways, Under Armor, Panera Bread), the introduction of GDPR and the emergence of new application development architectures and frameworks, Radware examined ... Read More
Are Application Testing Tools Still Relevant with Self Learning WAFs?

Are Application Testing Tools Still Relevant with Self Learning WAFs?

We all want to secure our applications. This task is becoming harder by the day as our applications constantly change multiple times per week, if not per day. According to Radware’s Web Application Security Report, 24% of the applications are changed on a weekly basis. In order to keep up, ... Read More
WAFs Should Do A Lot More Against Current Threats Than Covering OWASP Top 10

WAFs Should Do A Lot More Against Current Threats Than Covering OWASP Top 10

Looking in the rearview mirror The application threat landscape has rapidly evolved. For years, users consumed applications over the internet using the common tool – web browsers. At every point in time, there were 2-5 web browsers to support, and the variety of application development and testing frameworks was relatively ... Read More
Can Security Be Efficient Without Expertise or Intelligence?

Can Security Be Efficient Without Expertise or Intelligence?

Threats evolve fast, don’t lag behind! I recently returned from a business trip to an exotic destination, which is also a massive emerging market depending on how you look at it. The folks I’ve met do not seem to face other challenges than what you see in mature markets, but ... Read More
CAPTCHA Limitations of Bot Mitigation

CAPTCHA Limitations of Bot Mitigation

An essential part of the technological evolution is creating systems, machines and applications that autonomously and independently create, collect and communicate data. This automation frees information technology folk to focus on other tasks. Currently, such bots generate more than half of the internet traffic, but unfortunately every evolution brings with ... Read More
Has Cyber Security Reached Its Limits?

Has Cyber Security Reached Its Limits?

Thoughts from Radware’s Global Application and Network Security Report Rise of cryptocurrency trade and value boosts attacks; Notorious attacks of the year point at the human factor to blame; Machine-learning technologies are not fully mature nor broadly adopted; Despite a notion of tolerance, in one of four cases customers will ... Read More
Are Your Medical Records Safe? NO.

Are Your Medical Records Safe? NO.

Radware’s Web Application Security Report finds security flaws in the healthcare industry What do healthcare institutions, insurance companies, hospitals, pharmaceuticals and manufacturers of medical equipment all have in common? If you guessed room for improvement when it comes to protecting applications, you’re correct. The data records these organizations keep are ... Read More
Understanding the Real Cost of a Cyber-Attack and Building a Cyber-Resilient Business

Understanding the Real Cost of a Cyber-Attack and Building a Cyber-Resilient Business

Cyber-attacks are like parasites: they are not always visible, not always felt, but with plenty of potential to affect your operational efficiencies, service level agreements, and computing resources. All of those impacts bring potentially high costs. The first step to understanding and managing the cost of cyber-attacks is to do ... Read More
Loading...