Sicurezza

IoT Security: ROI Model Guide

Pubblicato il

By registering to join the Radware Blog community, you will enjoy the following perks: Free, immediate access to our Premium Content, including webinars, white papers, e-books, research reports and more – all with a single log-in Weekly RSS feed featuring the most recent blog content The ability to post in and engage with the comment […]

Sicurezza

TCP Reflection Attacks: Then and Now

Pubblicato il

We recently published a blog post about the rise in TCP reflection attacks throughout 2019. The public was able to observe the reflection campaign’s targeting of different verticals because the criminal(s) behind the attacks are leveraging public infrastructure as their refractors.  Ultimately, we published our insight into these campaigns because of their impact on both […]

Sicurezza

Edge Computing, 5G & IoT: Risks and Opportunities for Service Providers

Pubblicato il

Service providers are undergoing a technological revolution in the name of agility. They’re transforming computing infrastructures to gain service dexterity, provide new and improved applications to digitally native consumers in an app-driven world and deliver interactive content delivery services to new generations of customers who demand them. The overarching goal? Leverage automation and a new […]

Sicurezza

Sharpening the Edge

Pubblicato il

By registering to join the Radware Blog community, you will enjoy the following perks: Free, immediate access to our Premium Content, including webinars, white papers, e-books, research reports and more – all with a single log-in Weekly RSS feed featuring the most recent blog content The ability to post in and engage with the comment […]

Sicurezza

5G, Security, IoT, and ROI: Some Assembly and Automation Required

Pubblicato il

The current 5G commercialization wave has already moved the needle in terms of providing 5G users with access to new services. While this is only the beginning, communications service providers (CSPs) must still validate the business models when rolling out new services to ensure they deliver a positive cash flow. For example, CSPs must validate […]

Sicurezza

Threat Alert: TCP Reflection Attacks

Pubblicato il

Throughout 2019, Radware’s Threat Research Center (TRC) and Emergency Response Team (ERT) have been monitoring and defending against an increasing number of TCP reflection attacks. TCP reflection attacks, such as SYN-ACK reflection attacks, have been less popular among attackers until recently. The lack of popularity was mainly due to the wrong assumption that TCP reflection […]

Sicurezza

Cloud-Native Application Security Challenges

Pubblicato il

Application security has historically taken a back seat to application delivery. Traditional IT security teams view themselves as gatekeepers; they must do their jobs correctly or their organizations face increased risk. They incorporate high security standards into every operation, but achieving these standards takes time, testing and iterations. Development teams fret because this slows application […]

Sicurezza

Consistent Security Meets Continuous Deployment on Azure

Pubblicato il

It wasn’t that long ago when applications were monolithic pieces of software and updating them required a formal software release. Most businesses released updates once or twice a year— a very agile company might update once a quarter.  But as cloud computing evolved, a revolution began in software development. Continuous Integration/Continuous Deployment (CI/CD) became the […]

Sicurezza

The State of AI in Cybersecurity Today

Pubblicato il

First, a clarification: AI is a broad domain and while technically the term AI is a correct denomination for the algorithms used in the security industry, there is no ‘real’ AI in use today. An Artificial Intelligence is a system that can sense its environment, reason about it and pivot according to perceived changes allowing […]