Application Delivery Beyond DNS: How EDNS Enhances Internet Performance and Security How many phone numbers can you recall offhand? Probably very few, because we rely on contact lists to remember them. In the early days of the internet, reaching a computer required the same memorization: you had to know its IP address. Rotem Ben Rubi |August 20, 2025
Threat Intelligence The Price of Transparency: PoCs, Disclosure and Unsecured Hardware A proof of concept (PoC) is a piece of code or a process designed to demonstrate that a vulnerability is real and exploitable. Ori Meidan |August 19, 2025
Application Protection AI Meets Compliance: Why the EU AI Act Matters to Every Organization Adopting AI AI is quickly becoming core to business operations. Organizations across sectors are adopting AI to improve decision-making, automate workflows, and strengthen cybersecurity. Dan Schnour |August 13, 2025
Application Protection We Used to Read the Manual - Now, We Just Ask Let’s be honest, traditional user guides often feel like a maze. You're searching for one specific answer, flashlight in hand, only to end up bumping into walls of text, navigating loops of cross-references, and questioning your life choices somewhere around Section 14.3.2. Dalit Bar |August 12, 2025
Threat Intelligence Radware’s H1 Global Threat Analysis: The Rising Tide of Cyberthreats in 2025 The first half of 2025 marked a decisive escalation in the sophistication, scale, and persistence of digital threats. Across nearly every attack vector monitored by Radware, cyberthreat activity intensified, led by surges in Web DDoS attacks, application-layer exploitation, hacktivist campaigns, and the aggressive proliferation of bad bots. Pascal Geenens |August 11, 2025
Threat Intelligence Advanced Business Logic Attack Techniques : Fail-open Bot Attacks In this blog, I’ll uncover ways bot operators disguise their bot attacks as a system bug to bypass your bot detections--and how you can identify this scenario when it happens to you. Arik Atar |August 07, 2025
DDoS Protection Why AI Is the New Weapon for DDoS Attacks - and the New Defense DDoS has evolved. It’s no longer just about brute force. It’s about precision, speed, and intelligence—and it’s being driven by AI. Eva Abergel |August 06, 2025
Application Delivery Modern Authentication: Why SAML, OIDC, and Cloud-Based IdPs Are the New Standard As organizations continue to migrate toward cloud-first, API-driven, and mobile-friendly architectures, the methods we use to verify identity must evolve. Isabela Korner |August 05, 2025
Application Protection MSSPs: You’re Missing Revenue Right in Front of You Let’s be real - connectivity alone isn’t paying like it used to. But here’s the thing: every fiber link you deliver is a missed security upsell - unless you turn it into a secure link. Prakash Sinha |July 31, 2025
Application Protection ATO Attack Mitigation: How Radware Bot Manager Blocked a Massive Attack Campaign The combination of seamless user experiences and increasing consumer confidence in online transactions has enabled the digital economy to reach unprecedented heights, with millions of consumers adopting online platforms for their shopping or financial needs. Dhanesh Ramachandran |July 30, 2025
Application Protection CitrixBleed 2 Hits Again - Why Now Is the Moment to Break Up with NetScaler Another month, another Citrix security crisis. On June 17, 2025, Citrix disclosed two new critical vulnerabilities in its NetScaler ADC and Gateway platforms. Prakash Sinha |July 29, 2025
Application Protection Understanding BOLA: One of the Most Common and Dangerous API Business Logic Security Risks In the ever-evolving landscape of application security, API business logic vulnerabilities have become a growing concern - especially as digital experiences rely more heavily on data-rich, interconnected services. Uri Dorot |July 24, 2025