Syndicated Blog

Radware Blog
The Radware Blog shares vital knowledge with IT decision makers on application delivery, virtualization/cloud, security and specialized service provider needs.
Automating Cyber-Defense

Automating Cyber-Defense

AI has potential to make the lives of security professionals a lot easier – but it should be approached with caution. Deep learning is a useful tool to optimize and validate security ...
Cybersecurity as a Selling Point: Retailers Take Note

Cybersecurity as a Selling Point: Retailers Take Note

UK-based retailers were no strangers to data breaches in 2018. In June, Dixons Carphone announced a breach of 5.9 million customer bank card details and 1.2 million personal data records, and the ...
2018 In Review: Healthcare Under Attack

2018 In Review: Healthcare Under Attack

Radware’s ERT and Threat Research Center monitored an immense number of events over the last year, giving us a chance to review and analyze attack patterns to gain further insight into today’s ...
Ensuring a Secure Cloud Journey in a World of Containers

Ensuring a Secure Cloud Journey in a World of Containers

As organizations transition to the cloud, many are adopting microservice architecture to implement business applications as a collection of loosely coupled services, in order to enable isolation, scale, and continuous delivery for ...
Growing Your Business: Millennials and M-Commerce

Growing Your Business: Millennials and M-Commerce

Millennials are the largest generation in the U.S. labor force—a position they’ve held since 2016—and they’re involved in the majority (73%) of B2B purchasing decisions. Raised in the age of the Internet, ...
What Can We Learn About Cybersecurity from the Challenger Disaster? Everything.

What Can We Learn About Cybersecurity from the Challenger Disaster? Everything.

Understanding the potential threats that your organization faces is an essential part of risk management in modern times. It involves forecasting and evaluating all the factors that impact risk. Processes, procedures and ...
Marriott: The Case for Cybersecurity Due Diligence During M&A

Marriott: The Case for Cybersecurity Due Diligence During M&A

If ever there was a perfectly packaged case study on data breaches, it’s Marriott’s recently disclosed megabreach. Last week, the hotel chain announced that its Starwood guest reservation system was hacked in ...
2019 Predictions: Will Cyber Serenity Soon Be a Thing of the Past?

2019 Predictions: Will Cyber Serenity Soon Be a Thing of the Past?

In 2018 the threat landscape evolved at a breakneck pace, from predominantly DDoS and ransom attacks (in 2016 and 2017, respectively), to automated attacks. We saw sensational attacks on APIs, the ability ...
Evolving Cyberthreats: It’s Time to Enhance Your IT Security Mechanisms

Evolving Cyberthreats: It’s Time to Enhance Your IT Security Mechanisms

For years, cybersecurity professionals across the globe have been highly alarmed by threats appearing in the form of malware, including Trojans, viruses, worms, and spear phishing attacks. And this year was no ...
Cybersecurity for the Business Traveler: A Tale of Two Internets

Cybersecurity for the Business Traveler: A Tale of Two Internets

Many of us travel for work, and there are several factors we take into consideration when we do. Finding the best flights, hotels and transportation to fit in the guidelines of compliance ...
Loading...