Sicurezza

A Three-Episode DDoS Ransom Attack Prologue

Pubblicato il

DDoS attacks are becoming a part of ransom attacks. Instead of infiltrating secure organizational assets, attackers are launching devastating DDoS attacks to demonstrate their capabilities and demand ransom money. Understanding the ransom DDoS threat is essential to building an effective mitigation plan. Our story begins in August of 2020, and continues for over a year […]

Sicurezza

The Most Important Question to Ask Security Vendors Before Hiring Them

Pubblicato il

Your customer’s digital experience should never be compromised when under a DDoS attack. When discussing security solutions with Chief Security Officers (CSOs), one of the most frequent concerns is the false positives rate. A false positive is a mislabeled security alert indicating a threat in the absence of one. Regardless of the benefits security solutions […]

Sicurezza

What Does a Unified Security Strategy in the Public Cloud Look Like?

Pubblicato il

Salesforce’s Sahil Khanna, Director of Product Management for Infrastructure and Application Security, spoke with Radware’s Bill Kim in the latest episode of Radware Exchange Live about what a unified security strategy in the public cloud looks like. Watch the clip below to gain insight about security and availability challenges in the public cloud, the rate […]

Sicurezza

The Quest To Automate The Business Of Fake News

Pubblicato il

With several elections around the corner, all eyes are on whether there will be fair play as fabricated information that mimics news headlines prevail. We’ve seen the tactics of fake news used in all aspect of life from false headlines used as bait to generate ad impressions and clicks on a site, to more extreme […]

Sicurezza

A Quick History of IoT Botnets

Pubblicato il

The Internet of Things (IoT) describes a world where just about anything is an Internet-enabled device. IoT is comprised of smart physical objects such as vehicles and buildings or embedded devices such as refrigerators, toasters and routers. These devices feature sensors and an IP address for Internet connectivity, enabling these objects to collect and exchange […]