Application Protection The Paradigm Shift in Software Development Mentoring with AI Tools The rapid advancement of AI tools is reshaping the way software was developed, and with it, the role of mentors and senior developers. AI is not just a productivity tool for developers; it's transforming the way they solve problems, write code, and even learn. Michael Rebello |December 20, 2024
Application Protection A Look Ahead: Radware Experts Weigh In on 2025 Cybersecurity Trends Radware’s security experts already have their sights set on 2025. See what they are predicting about the cybersecurity industry and the threats that organizations can expect to face next year. Radware |December 19, 2024
Application Delivery IAC and the ROI it Brought to Us at Radware At Radware, conducting Infrastructure as Code (IAC) has changed the way we manage and optimize our infrastructure. IAC has not only enhanced operational efficiency, but also provided a significant return on investment (ROI), driving cost savings, productivity gains, and faster delivery times. Roni Yudkovich |December 18, 2024
Application Protection HTTP Header Anomaly-based Advanced Behavioural Bot Detection HTTP headers are integral components of web communication. They enable information exchange between clients (e.g., web browsers) and servers, helping the server process requests and the client interpret responses correctly. Amrit Talapatra |December 16, 2024
Threat Intelligence How Bots Attack Your Application and Why You Probably Missed It Imagine someone finding a spare key under your home's doormat just by guessing. This is similar to how bot operators take advantage of overlooked application vulnerabilities. Towards the upcoming holidays -I have gathered three hacker tutorials from the Darknet published in the second half of 2024. Arik Atar |December 12, 2024
Threat Intelligence 2024 Application Threat Trends: From “Hit and Run” To “Low and Slow” As part of Radware’s ongoing threat monitoring, Radware’s CTI team monitors over 26 underground marketplaces used by hackers to illegally trade breached accounts. In those marketplaces, hackers who engage in account takeover attacks sell their freshly breached accounts using ads. Arik Atar |December 11, 2024
Application Protection Unpacking the Technical Framework of Radware Bot Manager’s Adaptive Clustering and Traffic Segmentation Module In one of our previous blog post, we discussed how AI plays a critical role in identifying and mitigating bot attacks. Today, we’re building on that discussion by elaborating on one of our advanced approaches for detecting bots: Radware Bot Manager’s Adaptive Clustering and Traffic Segmentation module. Rakesh Thatha |December 10, 2024
Security Innovating the Future: Highlights from Radware’s Global AI Hackathon 2024 The Radware Hackathon 2024 – AI in Action – was a thrilling event that brought together the brightest minds from our various global functions and teams including R&D, Services, Delivery, Marketing, and Sales. From Tel Aviv to Bangalore, Chennai to virtual Zoom rooms, teams collaborated to redefine AI-powered innovations in cybersecurity and application delivery. Tamir Ron |December 09, 2024
Application Protection Discover Radware's New Service: Open the Door to Internal Cyberattack Data and Intelligence A few weeks ago, we launched Radware Threat Intelligence service, providing all Radware customers with access to real-time cyberattack data. This invaluable resource is now available to enhance Radware services, helping customers stay ahead of emerging threats, identify the next zero-day vulnerabilities, and drive innovative security solutions. Meir Michaeli |December 05, 2024
Application Protection Advanced Attacks on Embedded Gen AI Tools and Gen AI Apps – What to Watch For Yes, another blog article about AI and cybersecurity… but it’s a topic that remains crucial. In this article, we’ll explore how generative AI (Gen AI) tools create new attack surfaces and are susceptible to various types of cyber threats. Uri Dorot & Pavan Thatha |December 04, 2024
Application Protection Applying Design Thinking in Cyber Security Product Development In today’s digital landscape, where cybersecurity threats evolve rapidly and unpredictably, developing security solutions requires more than just technical expertise. Traditional approaches to cybersecurity development often focus on building features to counter threats, but they may overlook an important factor: the user. This is where Design Thinking, a human-centred problem-solving framework, proves invaluable. Michael Rebello |December 03, 2024
Application Protection Elevating Anomaly-Based Bot Detection via Dynamic Threshold Management In our previous post, we discussed the role of anomaly-based detection in identifying and mitigating sophisticated bot attacks. In this blog, we’re diving deeper into how Dynamic Threshold Management strengthens this approach by offering adaptive, real-time adjustments to detection thresholds. This tool enables a refined and responsive defense against evolving bot attacks, ensuring minimal false positives while maximizing detection accuracy. Rakesh Thatha |November 27, 2024