Is It Legal to Evaluate a DDoS Mitigation Service?

Is It Legal to Evaluate a DDoS Mitigation Service?

A couple of months ago, I was on a call with a company that was in the process of evaluating DDoS mitigation services to protect its data centers. This company runs mission ...
DDoS Protection Requires Looking Both Ways

DDoS Protection Requires Looking Both Ways

Service availability is a key component of the user experience. Customers expect services to be constantly available and fast-responding, and any downtime can result in disappointed users, abandoned shopping carts, and lost ...
The Big, Bad Bot Problem

The Big, Bad Bot Problem

Roughly half of today’s internet traffic is non-human (i.e., generated by bots). While some are good—like those that crawl websites for web indexing, content aggregation, and market or pricing intelligence—others are “bad.” ...
Excessive Permissions are Your #1 Cloud Threat

Excessive Permissions are Your #1 Cloud Threat

Migrating workloads to public cloud environment opens up organizations to a slate of new, cloud-native attack vectors which did not exist in the world of premise-based data centers. In this new environment, ...
The Costs of Cyberattacks Are Real

The Costs of Cyberattacks Are Real

Customers put their trust in companies to deliver on promises of security. Think about how quickly most people tick the boxes on required privacy agreements, likely without reading them. They want to ...
What Do Banks and Cybersecurity Have in Common? Everything.

What Do Banks and Cybersecurity Have in Common? Everything.

New cyber-security threats require new solutions. New solutions require a project to implement them. The problems and solutions seem infinite while budgets remain bounded. Therefore, the challenge becomes how to identify the ...
Looking Past the Hype to Discover the Real Potential of AI

Looking Past the Hype to Discover the Real Potential of AI

How can organizations cut through the hype around AI to understand the most important issues they should be addressing? How can they incorporate AI into their security strategies now to take advantage ...
5 Ways Modern Malware Defeats Cyber Defenses & What You Can Do About It

5 Ways Modern Malware Defeats Cyber Defenses & What You Can Do About It

Malware is a key vector for data breaches. Research shows that 51% of data breaches include the usage of malware, whether for initial breach, expansion within the network or heisting data. Yet ...
How Cyberattacks Directly Impact Your Brand: New Radware Report

How Cyberattacks Directly Impact Your Brand: New Radware Report

Whether you’re an executive or practitioner, brimming with business acumen or tech savviness, your job is to preserve and grow your company’s brand. Brand equity relies heavily on customer trust, which can ...
10 Most Popular Blogs of 2018

10 Most Popular Blogs of 2018

Between large scale cyberattacks, the implementation of GDPR and increasing popularity of smart home technologies (and their associated vulnerabilities), we had a lot to write about this year. Of the hundreds of ...
Loading...