Application Delivery Enhancing Application Security: The Power of Integrating Malicious IP Feeds into your ADC In today's digital world, the fight against online threats is more intense than ever. Cyber attackers are getting smarter, and… Dalit Bar | April 10, 2024
Threat Intelligence HTTP/2 Continuation Flood In the realm of web security, vulnerabilities within protocols can lead to significant disruptions. The HTTP/2 protocol, while offering enhanced… Pascal Geenens | April 9, 2024
Application Protection The Power of Actor Anomalies in Cybersecurity - Part 1 In the ever-evolving landscape of cybersecurity, understanding the actors involved is crucial for effective threat detection and mitigation. Tomer Rozentzvaig | April 4, 2024
Application Delivery Voice Activated SOC - Zero MTTR Is Possible Voice activation has not yet found its place in security operation centers (SOCs), but its adoption could make a genuine… Itay Raviv | April 3, 2024
Threat Intelligence Loop DoS: Datagram Application-Layer Denial of Service Attacks On March 19, 2024, a new threat emerged from the research group of Prof. Dr. Christian Rossow at CISPA Helmholtz… Ward Wrzenski | April 2, 2024
Application Delivery Navigating Kubernetes Scalability Challenges with Alteon While Kubernetes is a powerful orchestration tool that greatly simplifies the deployment, scaling, and operations of application containers, it does… Isabela Korner | March 29, 2024
Application Delivery Ensuring Business Continuity: The Vital Role of Proper ADC Configuration In today's fast-paced digital landscape, the proper configuration of an Application Delivery Controller (ADC) is not just a matter of… Guy Shimon | March 28, 2024
Application Delivery Top 5 Benefits of Using Alteon VA In Public Cloud Environments Businesses are striving to find the best solutions to connect their applications to cloud environments, which promise limitless scalability, remarkable… Avi Katz | March 27, 2024
Application Protection Securing SSL/TLS Certificates: An In-Depth Look at CWAP NoKey Technology In the ever-evolving digital landscape, the importance of securing online communication cannot be overstated. Rotem Elharar | March 26, 2024
DDoS Protection Insights into a 3.5Million Request per Second Web DDoS Attack on a Leading European Bank In the realm of cybersecurity, vigilance is paramount, as evidenced by a recent incident involving a prominent European bank hit… Eva Abergel | March 22, 2024
Service Providers Protecting Network and Applications as a Managed Service Provider The lack of security expertise is forcing many enterprises to evaluate service providers (SPs) for the responsibility of protecting their… Prakash Sinha | March 21, 2024
Application Protection Bot Management Technology Landscape: A 360-degree view (Part 2) Now, in the second part of the blog series, we shift our focus to the tools used for countering bots. Amrit Talapatra | March 20, 2024
Application Security Application Security in the Microservices Era As organizations break their applications down into microservices, leveraging containers as the perfect architecture for it, the responsibility for securing… Ben Zilberman | October 10, 2019
DDoS Protection How to Stop Disruptive Web DDoS Tsunami Attacks The cyber security world is in turmoil. A new generation of HTTPS DDoS attacks is disrupting the market, bypassing organizations'… Uri Dorot | May 9, 2023
Security How Can You Protect What You Can't See? The need for speed is at the heart of organizations’ strategic decisions about digital transformation. Faster time to market for… Ben Zilberman | January 14, 2020
DDoS 5 Steps to Prepare for a DDoS Attack It’s inevitable almost as death and taxes: somewhere, at some point, you will come under a DDoS attack. The reasons… Eyal Arazi | September 10, 2019
Security C-Suite Survey: Accelerated Cloud Migrations, Lagging Security Recently, Enterprise Management Associates (EMA) conducted a research survey for Radware of senior executives across the globe to gain a… Chris Steffen | September 15, 2020
Security The State-Sponsored Cyberthreat Landscape There is a global chess match between nation-states, businesses and the various digital assets contained within these organizations. The result… Radware | December 10, 2019
Application Protection 3 Security 'Disconnects' That Need To Be Addressed Osterman Research recently conducted an in-depth, international survey of security-focused decision makers and influencers in large organizations. Our goal was… Michael Osterman | January 27, 2021
Service Provider Getting Ready for 5G & IoT It was the best of times, it was the worst of times, it was the age of 5G networks, it… Radware | February 4, 2020
Application Security The Evolution of Application Development The evolution of application development has gone through many stages, and each has had its challenges. It started with monolithic… David Monahan | October 16, 2019
Security Here's How Bots Are Exploiting Coronavirus Fears Coronavirus is a pandemic that the world has not witnessed in quite some time. International borders are closed. Major sports… Manwendra Mishra | April 1, 2020
Application Protection Protecting APIs & Securing Applications So Business Can Thrive Happy New Year! How about we start it with a quick pulse check? Does your organization have the desired visibility… Ben Zilberman | January 20, 2021
DDoS How to Recover from a DDoS Attack They say nothing lasts forever – and neither do DDoS attacks. Recovering from a DDoS attack is no simple matter,… Eyal Arazi | November 19, 2019