Syndicated Blog

Radware Blog
The Radware Blog shares vital knowledge with IT decision makers on application delivery, virtualization/cloud, security and specialized service provider needs.
A Look Inside the Attacker’s Toolkit: DNS DDoS Attacks

A Look Inside the Attacker’s Toolkit: DNS DDoS Attacks

| | DDoS Protection
DNS is a critical infrastructure for your online services, a DNS DDoS attack risks the availability of your services. Attackers are experts in DNS and know all the weak points to target ...
Service Provider Network Protection Automation – 6 Best Practices

Service Provider Network Protection Automation – 6 Best Practices

| | service provider
As the frequency and sophistication of distributed denial-of-service (DDoS) attacks continue to rise, service providers face the challenge of safeguarding their networks against these disruptive threats. Traditional manual approaches to DDoS protection ...
Turning Your DDoS Infrastructure Investment into a Profitable MSSP Venture

Turning Your DDoS Infrastructure Investment into a Profitable MSSP Venture

| | ddos, DDoS attacks
DDoS attacks pose a significant threat to businesses across industries, affecting both the organization and its customers. However, this threat also presents an opportunity for service providers to offer DDoS protection services ...
Streamlining DDoS and ADC Environment Management and Operation with Smart RBAC

Streamlining DDoS and ADC Environment Management and Operation with Smart RBAC

| | ddos, DDoS Protection
Flexible and rich out-of-the-box Role-Based Access Control (RBAC) in the DDoS and ADC management solution is a key fundamental enabler for large enterprises and service providers. When enterprises and service providers need ...
Importance of a High-Performance WAAP in today’s Threat Landscape (Part 1 of 2)

Importance of a High-Performance WAAP in today’s Threat Landscape (Part 1 of 2)

In today's digital landscape, the rise of increasingly sophisticated and frequent attacks, including ransomware, DDoS attacks, credential stuffing, multiple encoded injections, brute force attacks, and others, make it more important than ever ...
A Multi-Vector DDoS Attack: How Proactive Measures Saved the Day

A Multi-Vector DDoS Attack: How Proactive Measures Saved the Day

Recently, a Radware customer located in Eastern Europe was targeted in multiple DDoS (Distributed Denial of Service) attacks. The attack targeted multiple assets that hosted several types of services. The attacker’s goal ...
Unleashing Marketing Synergy – The Power of Vendor Partnerships for Business Growth

Unleashing Marketing Synergy – The Power of Vendor Partnerships for Business Growth

| | Partners, partnership
In today's highly competitive business landscape, partnerships have become a strategic approach for companies to achieve mutual growth and success. One valuable type of partnership is formed between businesses and their vendors ...
The Dark Side of Microservices: How to Protect Your Data from Breach Attacks

The Dark Side of Microservices: How to Protect Your Data from Breach Attacks

Hello and welcome back to my blog series on the dark side of microservices. In the previous blog we discussed the challenges that microservices architecture presents for protecting applications. In this blog, ...
The Impact of Bots on Airline and Travel Industries

The Impact of Bots on Airline and Travel Industries

Airlines and travel industry operators, badly impacted during the Covid pandemic, are now full steam ahead catering to a growing demand for travel and tourism. Even before the pandemic, they were constantly ...
ChatGPT refused to write cyber-attack code for us, so this is what we did next

ChatGPT refused to write cyber-attack code for us, so this is what we did next

ChatGPT has rapidly become a ubiquitous presence in our digital lives; it has over 100 million users within the first two months of its launch and more than 13 million daily visitors ...