DDoS Security
Understanding user intent – the panacea for mission-critical application QoE issues
In this blog post, we would like to continue our discussion about the panacea for mission-critical application QoE issues. Since analogies from the actual world of traffic to the world of IT ...
How to protect against the weakest link in cybersecurity – THE USERS
Cyberattacks continue to grow year over year. An astounding 5,126,930,507 breached records in 2021 represent an 11% increase in security incidents compared to 2020, based on IT governance analysis. Security professionals are ...
Why DDoS is still a major attack vector and how to protect against it
The first massive, documented DoS-style attack occurred during the week of February 7, 2000, when “mafiaboy,” a 15-year-old Canadian hacker, orchestrated a series of DoS attacks against several e-commerce sites, including Amazon ...
The power of real-time capabilities for communication service providers
A colleague of mine recently alerted me to a white paper she read about the competitive advantage of real-time. The concept of “real-time” remains a hot topic, and I can appreciate the ...
Radware Threat Researchers Live: Ep.14
In this episode, our Threat Researchers share the latest update on the new ransom group REvil and the cyber threat landscape as it stands today. The post Radware Threat Researchers Live: Ep.14 ...
The FCC is concerned about 5G security – shouldn’t you be?
In today’s 5G world, DDoS attacks have the power to disrupt network services and disturb the mobile subscriber experience to such an extent that customers may lose faith in their mobile carrier ...
Nurturing a healthy digital transformation process
Digital Transformation is already a familiar term. In its essence, it deals with the integration of digital technology in all business areas to bring better value to customers. Over the last year, ...
How greenfield 5G network operators like DISH are ushering in a new era of cybersecurity
In the world of telecom, a greenfield service provider is one where the deployment and configuration of its network are entirely new – where none existed before. In the USA, DISH is ...
The Most Important Question to Ask Security Vendors Before Hiring Them
False positives remain a significant concern that affects your chances of closing a deal or making a sale. The post The Most Important Question to Ask Security Vendors Before Hiring Them appeared ...
DDoS attacks and 5G: everything you need to know
Cybersecurity geeks may already know this historical tidbit… The first DDoS attack occurred back in 1999, when a computer at the University of Minnesota suddenly came under attack from a network of ...