What Do Banks and Cybersecurity Have in Common? Everything.

New cyber-security threats require new solutions. New solutions require a project to implement them. The problems and solutions seem infinite while budgets remain bounded. Therefore, the challenge becomes how to identify the priority threats… Continue reading What Do Banks and Cybersecurity Have in Common? Everything.

Looking Past the Hype to Discover the Real Potential of AI

How can organizations cut through the hype around AI to understand the most important issues they should be addressing? How can they incorporate AI into their security strategies now to take advantage of the technology’s ability to detect and mi… Continue reading Looking Past the Hype to Discover the Real Potential of AI

5 Ways Modern Malware Defeats Cyber Defenses & What You Can Do About It

Malware is a key vector for data breaches. Research shows that 51% of data breaches include the usage of malware, whether for initial breach, expansion within the network or heisting data. Yet despite malware being a pivotal attack vector, companies a… Continue reading 5 Ways Modern Malware Defeats Cyber Defenses & What You Can Do About It

How Cyberattacks Directly Impact Your Brand: New Radware Report

Whether you’re an executive or practitioner, brimming with business acumen or tech savviness, your job is to preserve and grow your company’s brand. Brand equity relies heavily on customer trust, which can take years to build and only mome… Continue reading How Cyberattacks Directly Impact Your Brand: New Radware Report

10 Most Popular Blogs of 2018

Between large scale cyberattacks, the implementation of GDPR and increasing popularity of smart home technologies (and their associated vulnerabilities), we had a lot to write about this year. Of the hundreds of blogs we published in 2018, several flo… Continue reading 10 Most Popular Blogs of 2018

2018 In Review: Memcache and Drupalgeddon

Attackers don’t just utilize old, unpatched vulnerabilities, they also exploit recent disclosures at impressive rates. This year we witnessed two worldwide events that highlight the evolution and speed with which attackers will weaponize a vulne… Continue reading 2018 In Review: Memcache and Drupalgeddon

2018 In Review: Healthcare Under Attack

Radware’s ERT and Threat Research Center monitored an immense number of events over the last year, giving us a chance to review and analyze attack patterns to gain further insight into today’s trends and changes in the attack landscape. He… Continue reading 2018 In Review: Healthcare Under Attack

What Can We Learn About Cybersecurity from the Challenger Disaster? Everything.

Understanding the potential threats that your organization faces is an essential part of risk management in modern times. It involves forecasting and evaluating all the factors that impact risk. Processes, procedures and investments can all increase, … Continue reading What Can We Learn About Cybersecurity from the Challenger Disaster? Everything.

Protecting Applications in a Serverless Architecture

Serverless architectures are revolutionizing the way organizations procure and use enterprise technology. Until recently, information security architecture was relatively simple; you built a fortress around a server containing sensitive data, and depl… Continue reading Protecting Applications in a Serverless Architecture

Growing Your Business: Security as an Expectation

Who is responsible for my device and application security? This is a critical question in today’s growing threat landscape, and one without a clear answer. Despite increases in demands for mobile app and connected device security features, no ke… Continue reading Growing Your Business: Security as an Expectation