The ADC is the Key Master for All Things SSL/TLS

In the movies (and real life) one often needs to go through the Key Master to get to the destination. The job of the Key Master is to keep control of the access to the locks and barriers that protect important or sensitive material. Sometimes there is one key to get to the hidden rewards […]

The post The ADC is the Key Master for All Things SSL/TLS appeared first on Radware Blog.

Continue reading The ADC is the Key Master for All Things SSL/TLS

Future-proof your Cisco ACE refresh

It has been a while since Cisco announced end-of-life for its Application Control Engine (ACE) products. The last date of support, January 31, 2019, is fast approaching. If you rely on ACE for load balancing in your environment, it is time to migrate and look to the future. Key considerations for migrating from Cisco ACE: […]

The post Future-proof your Cisco ACE refresh appeared first on Radware Blog.

Continue reading Future-proof your Cisco ACE refresh

The World is Changing

The world is changing; it always has but the world is changing faster now than it ever has before. This general change is translating into even bigger changes in the cyber world. Some of the key areas that are evolving aren’t new, like availability or security. Others like automation are maturing quickly, and then there […]

The post The World is Changing appeared first on Radware Blog.

Continue reading The World is Changing

Route Domains – Half-baked Virtualization Delivers Half-baked Results

Imagine browsing your favorite websites on your computer or playing a browser-based game when things start slowing down.  You click the window in frustration hoping that the site responds, to no avail.  Finally, the browser alerts you that something is making it run too slow and you need to reset it. The problem is not […]

The post Route Domains – Half-baked Virtualization Delivers Half-baked Results appeared first on Radware Blog.

Continue reading Route Domains – Half-baked Virtualization Delivers Half-baked Results

STM32 Analog Converter Phase Noise

[Avian] has been using STM32 ARM processors to sample RF for a variety of applications. At first, he was receiving relatively wide TV signals. Recently, though, he’s started dealing with very narrow signals and he found that his samples had a lot of spread in the frequency domain that he didn’t expect.

What followed was some detective work that resulted in a determination that phase noise was the culprit. But why? [Avian] took some measurements and noticed that the phase noise almost exactly matched the phase noise specification for the STM32’s phase locked loop (PLL).

Unfortunately, there didn’t seem to …read more

Continue reading STM32 Analog Converter Phase Noise

Hackaday Prize Entry: High Speed Sampling For The Raspberry Pi

The Raspberry Pi has become a firm favorite in our community for its array of GPIOs and other interfaces, as well as its affordable computing power. Unfortunately though despite those many pins, there is a glaring omission in its interfacing capabilities. It lacks an analogue-to-digital converter, so analog inputs have to rely on an expansion card either on those GPIOs or through the USB port.

Most people remain content with simple ADCs such as Microchip’s MCP3008, or perhaps a USB sound card for low frequency moving targets. But not [Kelu124], he’s set his sights on something much faster. The original …read more

Continue reading Hackaday Prize Entry: High Speed Sampling For The Raspberry Pi

Network Security Does Not Matter When You Invite the Hacker Inside

We build security solutions to protect our networks from the rest of the internet, but do we do anything to protect the network from our own employees and users?  The first line of protection for your networks is not the firewall or other perimeter security device, it is the education and protection of the people […]

The post Network Security Does Not Matter When You Invite the Hacker Inside appeared first on Radware Blog.

Continue reading Network Security Does Not Matter When You Invite the Hacker Inside

SCADA Part 2: Mission critical, highly vulnerable, almost un-protectable.

Hey folks, I’m back with my second installment on protecting the un-protectable: Last week we discussed the SCADA environment and some of the unique business and technology challenges we face when trying to secure it both from availability and cyber security hazards. The questions you are all asking yourself now are “how did we get […]

The post SCADA Part 2: Mission critical, highly vulnerable, almost un-protectable. appeared first on Radware Blog.

Continue reading SCADA Part 2: Mission critical, highly vulnerable, almost un-protectable.

SCADA Part 2: Mission critical, highly vulnerable, almost un-protectable.

Hey folks, I’m back with my second installment on protecting the un-protectable: Last week we discussed the SCADA environment and some of the unique business and technology challenges we face when trying to secure it both from availability and cyber security hazards. The questions you are all asking yourself now are “how did we get […]

The post SCADA Part 2: Mission critical, highly vulnerable, almost un-protectable. appeared first on Radware Blog.

Continue reading SCADA Part 2: Mission critical, highly vulnerable, almost un-protectable.

When the Application Stops Flowing, What Next?

Don’t you hate it when you have a problem, but have no idea what is causing it? The water in my house stopped running recently. I have a well with a pump and a fairly complex system of pipes going through a water filtration and softening system. I had no idea why the water was […]

The post When the Application Stops Flowing, What Next? appeared first on Radware Blog.

Continue reading When the Application Stops Flowing, What Next?