Sicurezza

Protecting Applications in a Serverless Architecture

Pubblicato il

Serverless architectures are revolutionizing the way organizations procure and use enterprise technology. Until recently, information security architecture was relatively simple; you built a fortress around a server containing sensitive data, and deployed security solutions to control the flow of users accessing and leaving that server. But how do you secure a server-less environment? The Basics […]

Sicurezza

Simple to Use Link Availability Solutions

Pubblicato il

Previously, I discussed how rerouting data center host infrastructure should be part of next-generation DDoS solutions.  In this blog, I will discuss how link availability solutions should also play a part. Traditional DDoS solutions offer us a measure of protection against a number of things that can disrupt service to our applications or environment. This […]

Sicurezza

Credential Stuffing Campaign Targets Financial Services

Pubblicato il

Over the last few weeks, Radware has been tracking a significant Credential Stuffing Campaign targeting the financial industry in the United States and Europe. Background Credential Stuffing is an emerging threat in 2018 that continues to accelerate as more breaches occur. Today, a breach doesn’t just impact the compromised organization and its users, but it […]

Sicurezza

Disaster Recovery: Data Center or Host Infrastructure Reroute

Pubblicato il

Companies, even large ones, haven’t considered disaster recovery plans outside of their primary cloud providers own infrastructure as regularly as they should. In March of this year, Amazon Web Services (AWS) had a massive failure which directly impacted some of the world’s largest brands, taking them offline for several hours. In this case, it was […]

Sicurezza

Protecting Sensitive Data: A Black Swan Never Truly Sits Still

Pubblicato il

The black swan – a rare and unpredictable event notorious for its ability to completely change the tides of a situation. For cybersecurity, these nightmares can take the form of disabled critical services such as municipal electrical grids and other connected infrastructure networks, data breaches, application failures, and DDoS attacks. They can range from the […]

Sicurezza

Are Your Applications Secure?

Pubblicato il

Executives express mixed feelings and a surprisingly high level of confidence in Radware’s 2018 Web Application Security Report.  As we close out a year of headline-grabbing data breaches (British Airways, Under Armor,  Panera Bread), the introduction of GDPR and the emergence of new application development architectures and frameworks, Radware examined the state of application security […]

Sicurezza

Protecting Sensitive Data: The Death of an SMB

Pubblicato il

True or False? 90% of small businesses lack any type of data protection for their company and customer information. The answer? Unfortunately true. Due to this lack of care, 61% of data breach victims are specifically small businesses according to service provider Verizon’s 2018 Data Breach Investigations. Although large corporations garner the most attention in […]

Sicurezza

The Evolution of IoT Attacks

Pubblicato il

What is the Internet of Things (IoT)? IoT is the ever-growing network of physical devices with embedded technologies that connect and exchange data over the internet. If the cloud is considered someone else’s computer, IoT devices can be considered the things you connect to the internet beyond a server or a PC/Laptop. These are items […]

Sicurezza

Free DNS Resolver Services and Data Mining

Pubblicato il

Why would companies offer free DNS recursive servers? DNS data is extremely valuable for threat intelligence. If a company runs a recursive DNS for consumers, it can collect data on new domains that “pop up”. It can analyze trends, build baselines on domain resolution and enrich its threat intelligence overall (machine learning and big data […]