Attack Mitigation
5 Ways Modern Malware Defeats Cyber Defenses & What You Can Do About It
Malware is a key vector for data breaches. Research shows that 51% of data breaches include the usage of malware, whether for initial breach, expansion within the network or heisting data. Yet ...
How Cyberattacks Directly Impact Your Brand: New Radware Report
Whether you’re an executive or practitioner, brimming with business acumen or tech savviness, your job is to preserve and grow your company’s brand. Brand equity relies heavily on customer trust, which can ...
10 Most Popular Blogs of 2018
Between large scale cyberattacks, the implementation of GDPR and increasing popularity of smart home technologies (and their associated vulnerabilities), we had a lot to write about this year. Of the hundreds of ...
2018 In Review: Memcache and Drupalgeddon
Attackers don’t just utilize old, unpatched vulnerabilities, they also exploit recent disclosures at impressive rates. This year we witnessed two worldwide events that highlight the evolution and speed with which attackers will ...
2018 In Review: Healthcare Under Attack
Radware’s ERT and Threat Research Center monitored an immense number of events over the last year, giving us a chance to review and analyze attack patterns to gain further insight into today’s ...
What Can We Learn About Cybersecurity from the Challenger Disaster? Everything.
Understanding the potential threats that your organization faces is an essential part of risk management in modern times. It involves forecasting and evaluating all the factors that impact risk. Processes, procedures and ...
Protecting Applications in a Serverless Architecture
Serverless architectures are revolutionizing the way organizations procure and use enterprise technology. Until recently, information security architecture was relatively simple; you built a fortress around a server containing sensitive data, and deployed ...
Growing Your Business: Security as an Expectation
Who is responsible for my device and application security? This is a critical question in today’s growing threat landscape, and one without a clear answer. Despite increases in demands for mobile app ...
The Delta Airlines Security Breach: A Case Study in How to Respond to a Data Breach
Recent data breaches against Panera Bread, Delta Airlines, Sears, Saks, and Lord & Taylor highlight a lot: the need for improved web application and internet security processes, better accountability, and why cybersecurity ...
Consolidation in Consumer Products: Could it Solve the IoT Security Issues?
In 2003, I went to Zermatt, Switzerland to go snowboarding under the Matterhorn. We had an eclectic group of people from all over the world. Some of us were enthusiasts, some ski ...
