The top trends CSPs and enterprises will face in 2021 and beyond

Like most everyone else, our way of working has been significantly affected by the COVID-19 pandemic. Fortunately, one thing that can’t be stopped, even if it may have been slowed, is the rollout of 5G, which remains a high priority around the world. A… Continue reading The top trends CSPs and enterprises will face in 2021 and beyond

Four Steps to Mitigate Future Healthcare Cyberattacks

Healthcare institutions are on edge, and not for the reason you’d think. It’s not entirely because of stretched resources due to COVID-19. Instead, they fear the rising number of healthcare cyberattacks. By October 2020, Health and Human S… Continue reading Four Steps to Mitigate Future Healthcare Cyberattacks

Lesson from Lockdowns: Crucial to Scale-Up Cybersecurity Services

The COVID-19 pandemic and governmental movement restrictions have led to an increased dependency on online services for individuals and businesses alike. Cybercriminals quickly identified this trend as an opportunity for gaining profits. They responded… Continue reading Lesson from Lockdowns: Crucial to Scale-Up Cybersecurity Services

Clouds and Edges Lead to New Security Challenges in 2021

This massive shift to the clouds and edges will continue through 2021 and beyond, and have a major effect on enterprise security.
The post Clouds and Edges Lead to New Security Challenges in 2021 appeared first on Radware Blog.
The post Clouds and Ed… Continue reading Clouds and Edges Lead to New Security Challenges in 2021

Keeping Your Garage Secure Using a Raspberry Pi

It is always unfortunate when the garage door is left open when you leave for an extended period of time. This has happened to me a couple of times. By leaving the garage door open, I was inviting unwanted guests into the garage. An unwanted guest can … Continue reading Keeping Your Garage Secure Using a Raspberry Pi

Tree-Tracker – Auditing a Log Harvest using IOT Edge Connect and node-red

At long last, Blue Water Farm is generating revenue! Around 20 acres of our land consists of dense, mature hardwood of oak, maple, and beech, and we were able to contract to sell 65 maple and 25 oak trees to a logging company. I won’t be retiring from … Continue reading Tree-Tracker – Auditing a Log Harvest using IOT Edge Connect and node-red

AppSec Decoded: Threats to IoT devices and the role of government regulation

Our latest AppSec Decoded video addresses the biggest threats to IoT devices and the role governments should play in IoT regulation.
The post AppSec Decoded: Threats to IoT devices and the role of government regulation appeared first on Software Inte… Continue reading AppSec Decoded: Threats to IoT devices and the role of government regulation

The 10 Most Popular Blogs of 2020

In 2020, a pandemic gripped the globe, grinding life to a halt — and creating unprecedented opportunities for threat actors.
The post The 10 Most Popular Blogs of 2020 appeared first on Radware Blog.
The post The 10 Most Popular Blogs of 2020 appeare… Continue reading The 10 Most Popular Blogs of 2020

Hacking Christmas Gifts: Artie Drawing Robot

If high-tech gadgets are on your holiday shopping list, it is worth taking a moment to think about the particular risks they may bring. Under the wrong circumstances, even an innocuous gift may introduce unexpected vulnerabilities. In this blog series,… Continue reading Hacking Christmas Gifts: Artie Drawing Robot

Bugcrowd Report Shows Marked Increase in Crowdsourced Security

The impact of the novel coronavirus pandemic on how enterprises work—and secure their workers and data—will last for years. And while the long-term ramifications are yet to be known, a recent survey from Bugcrowd shows a marked increase in crowdsource… Continue reading Bugcrowd Report Shows Marked Increase in Crowdsourced Security