Syndicated Blog

Radware Blog
The Radware Blog shares vital knowledge with IT decision makers on application delivery, virtualization/cloud, security and specialized service provider needs.
Reasons for, and Advantages of, the On-Premises Data Center and Private Cloud

Reasons for, and Advantages of, the On-Premises Data Center and Private Cloud

Cloud software and services are more popular than ever. The latest statistics reveal that around 50% of corporate data is already kept and managed in the cloud. Moreover, it is expected that by 2025 ...
Radware Bot Risk Scanner Safeguards Your Splunk Applications From Malicious Bots

Radware Bot Risk Scanner Safeguards Your Splunk Applications From Malicious Bots

Twenty-five percent of all internet traffic today is generated by bad bots. Unfortunately, many organizations cannot make a definitive distinction between good and bad bots. This leaves their applications vulnerable to malicious ...
TLS Flood Attacks — When Encryption Becomes a Liability

TLS Flood Attacks — When Encryption Becomes a Liability

| | DDoS attacks
TLS can provide strong protection against many types of cyberattacks, but they are not immune to DoS (denial of service) attacks. DoS attacks, which are a type of DDoS attack, are encrypted ...
How Service Providers Can Implement DoH Cost Effectively

How Service Providers Can Implement DoH Cost Effectively

DoH, or DNS over HTTP/S, is a secure protocol that facilitates encrypted DNS resolution through an HTTPS connection. Unlike traditional DNS resolution methods that utilize unencrypted TCP or UDP connections, DoH offers ...
Leading German Digital Gaming Platform Stops Fake Account Creation and Pilferage with Radware Bot Manager

Leading German Digital Gaming Platform Stops Fake Account Creation and Pilferage with Radware Bot Manager

As the online gaming industry steadily grows (overtaking the global film industry in revenue a few years ago), so do the types of bot attacks plaguing them in ever-increasing numbers. The post ...
Your Checklist for the Best “out-of-path” (OOP) DDoS Solution

Your Checklist for the Best “out-of-path” (OOP) DDoS Solution

| | DDoS attacks
In today's world, data breaches and cyber-attacks are becoming more and more frequent, which makes it essential to choose the one DDoS solution that is right for you. If you are a ...
DDoS Carpet-Bombing – Coming In Fast And Brutal

DDoS Carpet-Bombing – Coming In Fast And Brutal

| | DDoS Protection
In recent years, distributed denial of service (DDoS) attacks have become more frequent and sophisticated. Attackers continue to find new ways to flood target networks with massive scale attacks that grow exponentially ...
Hand out a Yellow or Red Card According to Your Rules of the Game

Hand out a Yellow or Red Card According to Your Rules of the Game

In Radware’s Cloud WAF solution, your application is protected from a virus violation, including other infractions like remote file inclusions, SQL injections, security misconfiguration, sensitive data exposure, broken access control, cross-site scripting ...
Real-world Insights — Why Customers are Moving from On-Premises WAFs to Cloud-Based WAFs

Real-world Insights — Why Customers are Moving from On-Premises WAFs to Cloud-Based WAFs

In today's world, web applications are a critical component of business operations. However, they are also a prime target for cyber-attacks. To protect against these threats, many organizations have implemented web application ...
4 Ways To Categorize Web DDoS Tsunami Attacks — Part 2

4 Ways To Categorize Web DDoS Tsunami Attacks — Part 2

There is an array of dimensions that can be used to characterize botnets launching Web DDoS Tsunamis floods. The following are dimensions relevant primarily for attack detection and mitigation. Other dimensions (like ...