How to (Securely) Share Certificates with Your Cloud Security Provider

How to (Securely) Share Certificates with Your Cloud Security Provider

Businesses today know they must handle sensitive data with extra care. But evolving cyber threats combined with regulatory demands can lead executives to hold their proverbial security cards close to their chest. For example, they may be reluctant to share encryption keys and certificates with a third party (i.e., cloud ... Read More
Bot Managers Are a Cash-Back Program For Your Company

Bot Managers Are a Cash-Back Program For Your Company

In my previous blog, I briefly discussed what bot managers are and why they are needed. Today, we will conduct a short ROI exercise (perhaps the toughest task in information security!). To recap: Bots generate a little over half of today’s internet traffic. Roughly half of that half (i.e. a ... Read More
The Big, Bad Bot Problem

The Big, Bad Bot Problem

Roughly half of today’s internet traffic is non-human (i.e., generated by bots). While some are good—like those that crawl websites for web indexing, content aggregation, and market or pricing intelligence—others are “bad.” These bad bots (roughly 26% of internet traffic) disrupt service, steal data and perform fraudulent activities. And they ... Read More
HTTPS: The Myth of Secure Encrypted Traffic Exposed

HTTPS: The Myth of Secure Encrypted Traffic Exposed

The S in HTTPS is supposed to mean that encrypted traffic is secure. For attackers, it just means that they have a larger attack surface from which to launch assaults on the applications to exploit the security vulnerabilities. How should organizations respond? Most web traffic is encrypted to provide better ... Read More
How Cyberattacks Directly Impact Your Brand: New Radware Report

How Cyberattacks Directly Impact Your Brand: New Radware Report

Whether you’re an executive or practitioner, brimming with business acumen or tech savviness, your job is to preserve and grow your company’s brand. Brand equity relies heavily on customer trust, which can take years to build and only moments to demolish. 2018’s cyber threat landscape demonstrates this clearly; the delicate ... Read More
Protecting Applications in a Serverless Architecture

Protecting Applications in a Serverless Architecture

Serverless architectures are revolutionizing the way organizations procure and use enterprise technology. Until recently, information security architecture was relatively simple; you built a fortress around a server containing sensitive data, and deployed security solutions to control the flow of users accessing and leaving that server. But how do you secure ... Read More
Are Your Applications Secure?

Are Your Applications Secure?

Executives express mixed feelings and a surprisingly high level of confidence in Radware’s 2018 Web Application Security Report. As we close out a year of headline-grabbing data breaches (British Airways, Under Armor, Panera Bread), the introduction of GDPR and the emergence of new application development architectures and frameworks, Radware examined ... Read More
WAFs Should Do A Lot More Against Current Threats Than Covering OWASP Top 10

WAFs Should Do A Lot More Against Current Threats Than Covering OWASP Top 10

Looking in the rearview mirror The application threat landscape has rapidly evolved. For years, users consumed applications over the internet using the common tool – web browsers. At every point in time, there were 2-5 web browsers to support, and the variety of application development and testing frameworks was relatively ... Read More
Can Security Be Efficient Without Expertise or Intelligence?

Can Security Be Efficient Without Expertise or Intelligence?

Threats evolve fast, don’t lag behind! I recently returned from a business trip to an exotic destination, which is also a massive emerging market depending on how you look at it. The folks I’ve met do not seem to face other challenges than what you see in mature markets, but ... Read More
CAPTCHA Limitations of Bot Mitigation

CAPTCHA Limitations of Bot Mitigation

An essential part of the technological evolution is creating systems, machines and applications that autonomously and independently create, collect and communicate data. This automation frees information technology folk to focus on other tasks. Currently, such bots generate more than half of the internet traffic, but unfortunately every evolution brings with ... Read More
Loading...