Ten common causes of downtime and how to avoid them (Google Cloud Next '17)

Understanding user intent – the panacea for mission-critical application QoE issues

In this blog post, we would like to continue our discussion about the panacea for mission-critical application QoE issues. Since analogies from the actual world of traffic to the world of IT ...
How to protect against the weakest link in cybersecurity – THE USERS

How to protect against the weakest link in cybersecurity – THE USERS

Cyberattacks continue to grow year over year. An astounding 5,126,930,507 breached records in 2021 represent an 11% increase in security incidents compared to 2020, based on IT governance analysis. Security professionals are ...
Why DDoS is still a major attack vector and how to protect against it

Why DDoS is still a major attack vector and how to protect against it

The first massive, documented DoS-style attack occurred during the week of February 7, 2000, when “mafiaboy,” a 15-year-old Canadian hacker, orchestrated a series of DoS attacks against several e-commerce sites, including Amazon ...
Radware Threat Researchers Live - ep.14 - Return of REvil, RDoS, Meris, LockBit, OMIGOD, Dark.IoT

Radware Threat Researchers Live: Ep.14

In this episode, our Threat Researchers share the latest update on the new ransom group REvil and the cyber threat landscape as it stands today. The post Radware Threat Researchers Live: Ep.14 ...
Nurturing a healthy digital transformation process

Nurturing a healthy digital transformation process

Digital Transformation is already a familiar term. In its essence, it deals with the integration of digital technology in all business areas to bring better value to customers. Over the last year, ...
The Most Important Question to Ask Security Vendors Before Hiring Them

The Most Important Question to Ask Security Vendors Before Hiring Them

False positives remain a significant concern that affects your chances of closing a deal or making a sale. The post The Most Important Question to Ask Security Vendors Before Hiring Them appeared ...

Secure Coding Practices