Application Delivery The Smart Way to Upgrade: Say Goodbye to Manual ADC Upgrades Meet Alex, an ADC administrator managing dozens of ADCs across multiple sites. Each time a software upgrade was due, he faced the same challenges: manually selecting devices, ensuring compatibility, and coordinating with different teams to schedule upgrades during maintenance windows. Dalit Bar |March 06, 2025
Application Delivery Sustainable Networking: How ADCs are Contributing to a Greener Data Center As the demand for digital services grows, so does the energy consumption of data centers. Sustainable networking has become a key priority, with Application Delivery Controllers (ADCs) playing a crucial role in optimizing resource usage and reducing environmental impact. Avi Katz |March 05, 2025
Application Protection Rising Threat of Account Takeover Attacks: Why Advanced Bot Management is Critical Account Takeover (ATO) attacks, which occur when malicious actors gain unauthorized access to a user’s account, represent one of the most significant cybersecurity challenges facing digital businesses today. Dhanesh Ramachandran |March 04, 2025
Application Protection Protecting APIs in the Age of Business Logic Attacks In recent years, how we build and interact with applications has drastically changed. APIs (Application Programming Interfaces) have become the backbone of modern applications, enabling seamless communication between systems and delivering fast, connected experiences to users. Uri Dorot |February 27, 2025
Application Delivery The Need for Secured Application Delivery Controllers in Educational Organizations In the 21st century, educational organizations increasingly relying on digital infrastructure to support remote learning and modern educational methods. This shift necessitates robust and secure application delivery technologies to ensure seamless and secure access to educational resources. Dror Zelber |February 26, 2025
AI and User Experience Everything, Everywhere, All at Once Product Design Strategies to Keep Users Focused During a Cyber Attack Anna Danilov |February 25, 2025
Application Delivery Broadcom’s VMware Acquisition: What It Means for Avi Networks Customers The technology landscape is shifting yet again, and this time, the ripple effects are being felt across enterprises using VMware’s NSX Advanced Load Balancer (formerly Avi Networks). With Broadcom’s $69 billion acquisition of VMware in late 2023, a series of sweeping changes are taking hold—changes that significantly impact customers and their bottom line. Prakash Sinha |February 19, 2025
Application Delivery The Crucial Role of Latency-Based Site Selection in GSLB Solutions In today’s fast-paced digital world, delivering content quickly and efficiently is paramount for the success of e-commerce and other online services. One of the key factors that influence the speed of content delivery is latency – the time it takes for data to travel from the server to the client. Isabela Korner |February 18, 2025
DDoS Protection AI SOC Xpert: Designing for Analysts, Not Just Algorithms In today’s cybersecurity landscape, attack tools and cyber threats are increasingly AI-powered, making traditional Security Operations Centers (SOCs) struggle to keep up. Adversaries now deploy AI-generated phishing attacks, deepfake social engineering, and automated botnets that adapt in real-time. Liora Breitman |February 13, 2025
DDoS Protection New Cloud Management Platform – Manage all Radware Services in One Place In today’s cybersecurity landscape, organizations face an increasing challenge in securing their digital assets against sophisticated, ever-evolving threats. As security needs grow, managing multiple security services in isolation is no longer practical. Tamar Barzilay |February 11, 2025
Threat Intelligence The Global AI Race: How DeepSeek Is Reshaping the Competitive Landscape The recent release of DeepSeek-R1 by the Chinese startup DeepSeek has garnered a lot of interest and could spark a new wave of innovation, potentially rebalancing the state of AI supremacy between the major competitors on the global stage. Pascal Geenens |February 10, 2025
Threat Intelligence DeepSeek's Cyberattack: A Wake-Up Call for AI Security In the ever-evolving world of artificial intelligence, few names have made as significant an impact as DeepSeek. Known for its groundbreaking advancements, DeepSeek has recently found itself in the headlines for a different reason—a cyberattack that has sent ripples through the tech community. Who was behind this attack, and what does it mean for the future of AI security? Eva Abergel |February 06, 2025
Security MegaMedusa, RipperSec’s Public Web DDoS Attack Tool Key insightsRipperSec is a pro-Palestinian, pro-Muslim hacktivist group operating from MalaysiaRipperSec has been operating on Telegram since June 2023 and Pascal Geenens |August 19, 2024
Botnets Ghosting Bots: The Story of Hoaxcalls Failures Ghosting: A term used to describe the practice of ceasing all communication and contact with a partner, friend or bot.The Daniel Smith |May 28, 2020
Attack Types & Vectors A Quick History of IoT Botnets The Internet of Things (IoT) describes a world where just about anything is an Internet-enabled device. IoT is comprised of Radware |March 01, 2018
DDoS Protection The Evolution of DDoS Attacks: A History of Cyber Threats and Lessons Learned Distributed Denial of Service (DDoS) attacks have become one of the most prevalent and disruptive cyber threats in the digital age. From their origins in the mid-1990s to the complex, multi-vector attacks of today, DDoS attacks have continuously evolved, posing significant risks to businesses, governments, and individuals worldwide. Radware |March 12, 2017