Can Security Be Efficient Without Expertise or Intelligence?

Can Security Be Efficient Without Expertise or Intelligence?

Threats evolve fast, don’t lag behind! I recently returned from a business trip to an exotic destination, which is also a massive emerging market depending on how you look at it. The folks I’ve met do not seem to face other challenges than what you see in mature markets, but ... Read More
CAPTCHA Limitations of Bot Mitigation

CAPTCHA Limitations of Bot Mitigation

An essential part of the technological evolution is creating systems, machines and applications that autonomously and independently create, collect and communicate data. This automation frees information technology folk to focus on other tasks. Currently, such bots generate more than half of the internet traffic, but unfortunately every evolution brings with ... Read More
Has Cyber Security Reached Its Limits?

Has Cyber Security Reached Its Limits?

Thoughts from Radware’s Global Application and Network Security Report Rise of cryptocurrency trade and value boosts attacks; Notorious attacks of the year point at the human factor to blame; Machine-learning technologies are not fully mature nor broadly adopted; Despite a notion of tolerance, in one of four cases customers will ... Read More
Are Your Medical Records Safe? NO.

Are Your Medical Records Safe? NO.

Radware’s Web Application Security Report finds security flaws in the healthcare industry What do healthcare institutions, insurance companies, hospitals, pharmaceuticals and manufacturers of medical equipment all have in common? If you guessed room for improvement when it comes to protecting applications, you’re correct. The data records these organizations keep are ... Read More
Understanding the Real Cost of a Cyber-Attack and Building a Cyber-Resilient Business

Understanding the Real Cost of a Cyber-Attack and Building a Cyber-Resilient Business

Cyber-attacks are like parasites: they are not always visible, not always felt, but with plenty of potential to affect your operational efficiencies, service level agreements, and computing resources. All of those impacts bring potentially high costs. The first step to understanding and managing the cost of cyber-attacks is to do ... Read More
Web Application Security in a Digitally Connected World

Web Application Security in a Digitally Connected World

Apps control our lives today. We pay our bills, do our shopping, communicate with our doctors, buy our groceries, order a taxi, and even order our lunch through ‘apps.’ If you can think of it, there is an app for it. And these apps live on our phones, our desktops, ... Read More
DDoS Attackers Call for DDoS Defenders

DDoS Attackers Call for DDoS Defenders

In late July we were approached by a government agency of a Latin American country who was suffering from an over-a-month long campaign of DDoS attacks they had so far failed to mitigate. Each of the attacks lasted for several hours at a time –sometimes multiple times a day – ... Read More
Cyber and Securities – Financial Institutions Attack Landscape

Cyber and Securities – Financial Institutions Attack Landscape

Recently Italian bank Unicredit suffered two security breaches. Data of 400,000 customers was stolen, including loan account numbers and Personally Identifiable Information (PII). There is a suspicion the breach had to do with interaction with a 3rd party. This incident is the latest reported in a long history of cyber-attacks ... Read More
My Network has High Cholesterol

My Network has High Cholesterol

5 out of 6 businesses struggle daily with low profile DDoS attacks that consume their bandwidth and resources and pose a burden, resulting in poor service level and customer experience You know how when you get to a certain age, feeling ‘good’ is not good enough? Well it might be ... Read More
How Do You Create a Flight Plan to a Never-Ending Journey?

How Do You Create a Flight Plan to a Never-Ending Journey?

In April 2017, we conducted a global survey of C-suite executives. All respondents represent organizations with at least $250 million (or the equivalent) in annual revenue. Our goal: to understand their greatest challenges, threats and opportunities when it comes to cyber security. When boarding a plane, have you ever wondered ... Read More