Radware launches SkyHawk Security to improve the overall security posture for organizations

Radware announced the spinoff of its Cloud Native Protector (CNP) business to form a new company called SkyHawk Security. To accelerate SkyHawk Security’s development and growth opportunities, an affiliate of Tiger Global Management will make a $35 mil… Continue reading Radware launches SkyHawk Security to improve the overall security posture for organizations

Malicious web application requests skyrocketing, bad actors stealthier than ever before

Radware released report findings which underscore 2021 as the year of the web application attack. Between 2020 and 2021, the number of malicious web application requests climbed 88%, more than double the year-over-year growth rate in distributed denial… Continue reading Malicious web application requests skyrocketing, bad actors stealthier than ever before

Eight resolutions to help navigate the new hybrid office model

Continuous review and improvement are crucial for a successful security program. As this year draws to a close, it is a good time to look back on 2021 and prepare a few resolutions for the new year. Adapting to the pandemic-created hybrid office model … Continue reading Eight resolutions to help navigate the new hybrid office model

Blocked DDoS events up 75% in the first nine months of 2021

Radware has published results from its report which provides an overview of the DDoS attack landscape, application attack developments, and unsolicited network scanning trends. “More DDoS attacks were blocked during the first nine months of 2021 than a… Continue reading Blocked DDoS events up 75% in the first nine months of 2021

Blocked DDoS attack volumes up, tech, healthcare and finance most targeted

Second quarter blocked DDoS attack volumes were up more than 40% compared to the same period in 2020, a Radware report reveals. The report provides an overview of DDoS attack trends by industry, as well as across applications and attack types. Notable … Continue reading Blocked DDoS attack volumes up, tech, healthcare and finance most targeted

Is it OK to publish PoC exploits for vulnerabilities and patches?

In the wake of the Microsoft Exchange ProxyLogon zero-day and F5 BIG-IP security exploits earlier this year, many are questioning if and when should researchers publish proof of concepts for vulnerabilities and associated patches. Hafnium hackers were … Continue reading Is it OK to publish PoC exploits for vulnerabilities and patches?

How do I select a bot protection solution for my business?

A recent research revealed that 25% of internet traffic consists of bots, meaning almost every human interacting online has its bot equivalent. Bots are generally used to automate simple and repetitive tasks, but can also be used to exploit vulnerabili… Continue reading How do I select a bot protection solution for my business?