Sicurezza

How Can You Protect What You Can’t See?

Pubblicato il

The need for speed is at the heart of organizations’ strategic decisions about digital transformation. Faster time to market for revenue-generating applications is a competitive advantage. New technologies, frameworks and paradigms emerge to accelerate productivity, efficiency and cost reduction. Yet these also create blind spots calling for new threats. Neglect can be very costly, as […]

Sicurezza

IoT Security: ROI Model Guide

Pubblicato il

By registering to join the Radware Blog community, you will enjoy the following perks: Free, immediate access to our Premium Content, including webinars, white papers, e-books, research reports and more – all with a single log-in Weekly RSS feed featuring the most recent blog content The ability to post in and engage with the comment […]

Sicurezza

5G, Security, IoT, and ROI: Some Assembly and Automation Required

Pubblicato il

The current 5G commercialization wave has already moved the needle in terms of providing 5G users with access to new services. While this is only the beginning, communications service providers (CSPs) must still validate the business models when rolling out new services to ensure they deliver a positive cash flow. For example, CSPs must validate […]

Sicurezza

More Destructive Botnets and Attack Vectors Are on Their Way

Pubblicato il

What can I say? 2019 has been an eventful year for botnet operators. We have seen everything from large scale take-downs that target those that host malicious services to new and improved attack vectors. While the attack landscape continues to grow at a rapid rate for botherders, we really need to sit down and start considering […]

Sicurezza

Don’t Get Schooled in “Hackademia”

Pubblicato il

Service providers (SPs) are stepping up to the challenge of fending off cybersecurity hackers for their higher education customers, including universities. With IoT and 5G happening in real-time and in parallel, SPs are leading in the deployment race for effective cyber-defense systems. While IoT security services are being added to an existing SP offering of […]

Sicurezza

Saving Creatures Big and Small with Cybersecurity

Pubblicato il

From the far-flung corners of the world to our most heavily populated areas, IoT is making an undeniable impact – and not just on humans. Animals, too, are reaping the benefits of an ever-connected planet. Indeed, IoT is being leveraged to monitor and protect species that are integral to our global ecosystems, from rhinos to […]

Sicurezza

What Do Corn, IoT and College Have in Common?

Pubblicato il

Last week, I drove my oldest to college, which took me through Iowa’s cornfields. As I gazed upon aisle after aisle of corn, the synapses in my brain started firing and I considered how vulnerable farmers are to agricultural IoT attacks that can impact what used to be a simple livelihood. Then, my brain shifted […]

Sicurezza

Healthcare is in Cybercriminals’ Crosshairs

Pubblicato il

The healthcare industry is a prime target of hackers. According to Radware’s 2018-2019 Global Application and Network Security Report, healthcare was the second-most attacked industry after the government sector in 2018. In fact, about 39 percent of healthcare organizations were hit daily or weekly by hackers and only 6 percent said they’d never experienced a […]

Sicurezza

Botnets: DDoS and Beyond

Pubblicato il

Traditionally, DDoS is an avenue of profit for botherders. But today’s botnets have evolved to include several attack vectors other than DDoS that are more profitable. And just as any business-oriented person would do, attackers follow the money. As a result, botherders are targeting enterprise and network software, since residential devices have become over saturated. […]

Sicurezza

How to Prevent Real-Time API Abuse

Pubblicato il

The widespread adoption of mobile and IoT devices, and increased use of cloud systems are driving a major change in modern application architecture. Application Programming Interfaces (APIs) have emerged as the bridge to facilitate communication between different application architectures. However, with the widespread deployment of APIs, automated attacks on poorly protected APIs are mounting. Personally […]