Sicurezza

What Do Banks and Cybersecurity Have in Common? Everything.

Pubblicato il

New cyber-security threats require new solutions. New solutions require a project to implement them. The problems and solutions seem infinite while budgets remain bounded. Therefore, the challenge becomes how to identify the priority threats, select the solutions that deliver the best ROI and stretch dollars to maximize your organization’s protection. Consultants and industry analysts can help, but they […]

Sicurezza

Top 3 Cyberattacks Targeting Proxy Servers

Pubblicato il

Today, many organizations are now realizing that DDoS defense is critical to maintaining an exceptional customer experience. Why? Because nothing diminishes load times or impacts the end user’s experience more than a cyberattack. As a facilitator of access to content and networks, proxy servers have become a focal point for those seeking to cause grief […]

Sicurezza

2018 In Review: Memcache and Drupalgeddon

Pubblicato il

Attackers don’t just utilize old, unpatched vulnerabilities, they also exploit recent disclosures at impressive rates. This year we witnessed two worldwide events that highlight the evolution and speed with which attackers will weaponize a vulnerability: Memcache and Druppalgeddon. Memcached DDoS Attacks In late February, Radware’s Threat Detection Network signaled an increase in activity on UDP port […]

Sicurezza

What Can We Learn About Cybersecurity from the Challenger Disaster? Everything.

Pubblicato il

Understanding the potential threats that your organization faces is an essential part of risk management in modern times. It involves forecasting and evaluating all the factors that impact risk. Processes, procedures and investments can all increase, minimize or even eliminate risk. Another factor is the human element. Often times, within an organization, a culture exists […]

Sicurezza

2019 Predictions: Will Cyber Serenity Soon Be a Thing of the Past?

Pubblicato il

In 2018 the threat landscape evolved at a breakneck pace, from predominantly DDoS and ransom attacks (in 2016 and 2017, respectively), to automated attacks. We saw sensational attacks on APIs, the ability to leverage weaponized Artificial Intelligence, and growth in side-channel and proxy-based attacks. And by the looks of it, 2019 will be an extension […]

Sicurezza

Protecting Applications in a Serverless Architecture

Pubblicato il

Serverless architectures are revolutionizing the way organizations procure and use enterprise technology. Until recently, information security architecture was relatively simple; you built a fortress around a server containing sensitive data, and deployed security solutions to control the flow of users accessing and leaving that server. But how do you secure a server-less environment? The Basics […]

Sicurezza

Simple to Use Link Availability Solutions

Pubblicato il

Previously, I discussed how rerouting data center host infrastructure should be part of next-generation DDoS solutions.  In this blog, I will discuss how link availability solutions should also play a part. Traditional DDoS solutions offer us a measure of protection against a number of things that can disrupt service to our applications or environment. This […]

Sicurezza

Credential Stuffing Campaign Targets Financial Services

Pubblicato il

Over the last few weeks, Radware has been tracking a significant Credential Stuffing Campaign targeting the financial industry in the United States and Europe. Background Credential Stuffing is an emerging threat in 2018 that continues to accelerate as more breaches occur. Today, a breach doesn’t just impact the compromised organization and its users, but it […]

Sicurezza

Disaster Recovery: Data Center or Host Infrastructure Reroute

Pubblicato il

Companies, even large ones, haven’t considered disaster recovery plans outside of their primary cloud providers own infrastructure as regularly as they should. In March of this year, Amazon Web Services (AWS) had a massive failure which directly impacted some of the world’s largest brands, taking them offline for several hours. In this case, it was […]

Sicurezza

Protecting Sensitive Data: A Black Swan Never Truly Sits Still

Pubblicato il

The black swan – a rare and unpredictable event notorious for its ability to completely change the tides of a situation. For cybersecurity, these nightmares can take the form of disabled critical services such as municipal electrical grids and other connected infrastructure networks, data breaches, application failures, and DDoS attacks. They can range from the […]