IoT, 5G Networks and Cybersecurity – Part 1: The Rise of 5G Networks

IoT, 5G Networks and Cybersecurity – Part 1: The Rise of 5G Networks

Smartphones today have more computing power than the computers that guided the Apollo 11 moon landing. From its original positioning of luxury, mobile devices have become a necessity in numerous societies across the globe. With recent innovations in mobile payment such as Apple Pay, Android Pay, and investments in cryptocurrency, ... Read More
The Evolving Network Security Environment – Can You Protect Your Customers in a 5G Universe?

The Evolving Network Security Environment – Can You Protect Your Customers in a 5G Universe?

Smart Farming depends on internet of things (IoT) devices and sensors to monitor vast farm fields, guiding farmers’ decisions about crop management through rich data. But it only takes one security flaw for all stakeholders within the ecosystem to be impacted. If hackers gain access to a single sensor, they ... Read More
Battling Cyber Risks with Intelligent Automation

Battling Cyber Risks with Intelligent Automation

Organizations are losing the cybersecurity race. Cyber threats are evolving faster than security teams can adapt. The proliferation of data from dozens of security products are outpacing the ability for security teams to process it. And budget and talent shortfalls limit the ability for security teams to expand rapidly. The ... Read More
How Secure is Your Medical Data?

How Secure is Your Medical Data?

Imagine getting online with your doctor on the other end of the streaming connection, and then sending her real-time data of your blood pressure and glucose levels for real-time analysis and consultation. It’s convenient, it’s timely, and it’s altogether probably cheaper than making a visit to the office. But is ... Read More
The Quadruple Play for your Local Grocer – Security, Voice, Data, and Video – and Bananas Too!

The Quadruple Play for your Local Grocer – Security, Voice, Data, and Video – and Bananas Too!

Earlier this year, Radware published “From the Front Lines- How a Multinational Bank Handled a Ransom Threat and SSL-based Attack” – a very timely piece describing the risks that large banking institutions face in the current security climate. However, perhaps lost in the message was the impact to smaller, local ... Read More
Hospital Stays Can Take Out More Than Your Organs

Hospital Stays Can Take Out More Than Your Organs

The Cyber Theft Threat in Healthcare and how Service Providers can Transform Risk to Reward You went to the hospital to get your appendix out and one week later your identity was taken from you as well. How did this happen? In their 2017 Data Breach survey, Verizon found that ... Read More
Eliminating Single Points of Failure, Part 1

Eliminating Single Points of Failure, Part 1

The Risk DDoS Attacks Pose to Enterprises The Role of the Firewall A Firewall is a necessary first step in protecting an enterprise network by establishing a barrier between a trusted, secure internal network and another outside untrusted network such as the Internet. Firewalls have evolved considerably over the years, ... Read More