Application Delivery and Application Security Should be Combined

Most businesses have multi-function printers that can fax, scan, and copy.  In our roles, we are multi-functional as well.  A network architect is often the operational troubleshooter because of his/her knowledge and expertise.  The fin… Continue reading Application Delivery and Application Security Should be Combined

Encryption is a Double-Edged Sword for the Healthcare Industry

The healthcare industry must take security and privacy seriously.  They collect and retain personal health information (PHI) and financial information while providing life-saving medical care.  The protection of this information and the netw… Continue reading Encryption is a Double-Edged Sword for the Healthcare Industry

Encryption is a Costume to Hide Threats on the Internet

It is the time of the year where adults and children alike put on costumes and go out to gather candy or create mischief. The costumes are scary or cute, but always achieve the goal of obfuscating the individual and hiding their true identity and intent. The person wearing the costume does not express their […]

The post Encryption is a Costume to Hide Threats on the Internet appeared first on Radware Blog.

The post Encryption is a Costume to Hide Threats on the Internet appeared first on Security Boulevard.

Continue reading Encryption is a Costume to Hide Threats on the Internet

Old Technologies Enable Future Secure Application Delivery Networking

Many years ago, one of my customers had an internet-facing application. They positioned load balancers in front of the application to support the growing traffic load. Traffic to the website was growing so fast, that parts of the network infrastructure could not support the customer load. One of the first components to fail under the […]

The post Old Technologies Enable Future Secure Application Delivery Networking appeared first on Radware Blog.

The post Old Technologies Enable Future Secure Application Delivery Networking appeared first on Security Boulevard.

Continue reading Old Technologies Enable Future Secure Application Delivery Networking

SSL Attacks – When Hackers Use Security Against You

In World War II, the Allies had a significant advantage because they were able to compromise the encryption protocols that the Japanese and Germans used to send sensitive messages.  They were able to intercept and decode messages to gain intelligence concerning sensitive military operations. In today’s Internet Age, malicious hackers are using standard encryption standards […]

The post SSL Attacks – When Hackers Use Security Against You appeared first on Radware Blog.

Continue reading SSL Attacks – When Hackers Use Security Against You

Outbound SSL Solutions Protect Assets in the Wild

Businesses need to protect their assets when they are within their protective infrastructure AND when they are actively exposed or placed within the unprotected external world. The tools and procedures needed to protect the internal assets are different from the ones that protect the assets when they leave the confines of the secured network. Walls […]

The post Outbound SSL Solutions Protect Assets in the Wild appeared first on Radware Blog.

Continue reading Outbound SSL Solutions Protect Assets in the Wild

The ADC Key Master Delegates Application Security Functions

One of the responsibilities of the Key Master is to provide access to the sensitive and secure information hidden within the locked facilities.  In my last post, I explained why the application delivery controller (ADC) is the Key Master for SSL/TLS communications on the internet.  It is the responsibility of the ADC to manage and […]

The post The ADC Key Master Delegates Application Security Functions appeared first on Radware Blog.

Continue reading The ADC Key Master Delegates Application Security Functions

The ADC is the Key Master for All Things SSL/TLS

In the movies (and real life) one often needs to go through the Key Master to get to the destination. The job of the Key Master is to keep control of the access to the locks and barriers that protect important or sensitive material. Sometimes there is one key to get to the hidden rewards […]

The post The ADC is the Key Master for All Things SSL/TLS appeared first on Radware Blog.

Continue reading The ADC is the Key Master for All Things SSL/TLS

Virtualization Requires New Models for Old Technologies

Driving a car is like riding a bike, if one refers to the old expression. It is fairly easy to recall how to do it if there has been some time since the last time one has been behind the steering wheel. Of course, this old adage does not apply if the way cars are […]

The post Virtualization Requires New Models for Old Technologies appeared first on Radware Blog.

Continue reading Virtualization Requires New Models for Old Technologies