Contributing Authors

    5 Must-Have DDoS Protection Technologies

    Distributed Denial of Service (DDoS) attacks have entered the 1 Tbps DDoS attack era. However, Radware research shows that DDoS attacks are not just...

    The Rise Of Soft-Robotics

    Robotics and mechanization have improved leaps and bounds over the past decade. That said, gesturing naturally, grasping objects with suitable pressure, touching and feeling...

    Why Cyber-Security Is Critical to The Loyalty of Your Most Valued Customers

    The recent data breaches against Panera Bread, Delta Airlines and Sears, and Saks and Lord & Taylor highlight a lot: the need for improved...

    6 Must-Have Metrics in Your DDoS Defense SLA

    Your Service Level Agreement (SLA) is a crucial component of DDoS defenses. It is your contractual guarantee outlining what your DDoS mitigation provider will...

    Behavioral Burst-Attack Protection

    Common DDoS attacks come in the form of sustained, high-volume traffic floods that ramp up gradually, reach a peak, and are then followed by...

    5 Ways to Speed Up Network Troubleshooting Efforts

    Network and application troubleshooting can be one of the highest profile and aggravating activities in which IT engages. Pressure can increase exponentially on IT...

    System Downtime: What does it Cost Companies?

    Server downtime is an issue that plagues the vast majority of organizations. When servers go down, many—if not all—of an organization’s most critical applications...

    9 Ways to Ensure Cloud Security

    Whether you’ve migrated some or all your infrastructure to the cloud, or are still considering the move, you should be thinking about security. Too...

    Shaping Smarter Cities: Thanks to Augmented Reality, Not All Statues Are Mute

    Recently I was reading an article about Dadbot—the chatbot created by James Vlahos that aimed to emulate his father. The idea for the project...

    Tesla’s Newest High-Power Batteries

    Let’s take a look at the newest high-power batteries for electric vehicles (EVs) and grid energy storage applications being produced by Tesla at its...

    Securing the Digital Supply Chain

    Ensuring a secure supply chain is a necessary precondition in today’s world of commerce. The digital supply chain has emerged as the weakest link...

    Cyber Insurance: What exactly is cyber insurance and why you need it?

    Well, Cyber insurance cannot defend your organization from cybercrime, but it can maintain your business on secure financial foothold in case a noteworthy security...

    FIVE WAYS in which Modern Malware can defeat your defenses

    Malware is a key vector for data breaches. Research shows that 51% of data breaches include the usage of malware, whether for initial breach,...

    Smart Grids Overcome Renewable Energy Variability and Uncertainty

    Renewable Energy (RE, which includes hydro, biomass, and geothermal as well as the more familiar photovoltaic (PV) and wind) faces it critics. At one...

    Your Eyes Will Unlock Tighter Security for Your Phone

    Your eyes are your passwords! A number of smartphones launched in the last 12-18 months, including the latest Samsung Galaxy S8, have in-built iris...

    Related News