Search results


Securing APIs: How Radware Protects Against the OWASP API Top 10

Securing APIs: How Radware Protects Against the OWASP API Top 10

Channel Logo
Jeremie Ohayon

APIs are the backbone of modern applications, but they also present significant security risks. In this webinar, we’ll explore how Radware’s API protection
safeguards against the most critical API threats, as defined by the OWASP API Top 10. You’ll gain insights into Radware’s advanced security mechanisms,
including AI-based Business Logic Attack Protection, API Gateway integration, and automatic runtime mitigation techniques. Join us to learn how to enhance…

Securing APIs: How Radware Protects Against the OWASP API Top 10

Securing APIs: How Radware Protects Against the OWASP API Top 10

Channel Logo
Jeremie Ohayon

APIs are the backbone of modern applications, but they also present significant security risks. In this webinar, we’ll explore how Radware’s API protection
safeguards against the most critical API threats, as defined by the OWASP API Top 10. You’ll gain insights into Radware’s advanced security mechanisms,
including AI-based Business Logic Attack Protection, API Gateway integration, and automatic runtime mitigation techniques. Join us to learn how to enhance…

Securing APIs: How Radware Protects Against the OWASP API Top 10

Securing APIs: How Radware Protects Against the OWASP API Top 10

Channel Logo
Jeremie Ohayon

APIs are the backbone of modern applications, but they also present significant security risks. In this webinar, we’ll explore how Radware’s API protection
safeguards against the most critical API threats, as defined by the OWASP API Top 10. You’ll gain insights into Radware’s advanced security mechanisms,
including AI-based Business Logic Attack Protection, API Gateway integration, and automatic runtime mitigation techniques. Join us to learn how to enhance…

Advanced AI Strategies for Application Threat Mitigation

Advanced AI Strategies for Application Threat Mitigation

Channel Logo
Ron Meyran, VP Cyber Threat Intel, Radware | Arik Atar, Senior Threat Intel Researcher, Radware

As the evolution of digital threats never stops, traditional defenses like geo-blocking and IP reputation services often fall short, leaving critical
industries—government, finance, travel, and hospitality—vulnerable to sophisticated bot attacks. This webinar, hosted by Radware’s CTI Researchers, dives
into the current application threat landscape, exposing the limitations of common defense mechanisms against modern bots and Distributed Denial-of-Servi…

Advanced AI Strategies for Application Threat Mitigation

Advanced AI Strategies for Application Threat Mitigation

Channel Logo
Ron Meyran, VP Cyber Threat Intel, Radware | Arik Atar, Senior Threat Intel Researcher, Radware

As the evolution of digital threats never stops, traditional defenses like geo-blocking and IP reputation services often fall short, leaving critical
industries—government, finance, travel, and hospitality—vulnerable to sophisticated bot attacks. This webinar, hosted by Radware’s CTI Researchers, dives
into the current application threat landscape, exposing the limitations of common defense mechanisms against modern bots and Distributed Denial-of-Servi…

Beyond the Basics: Elevating Network Transformation with Enterprise-Grade DDI

Beyond the Basics: Elevating Network Transformation with Enterprise-Grade DDI

Channel Logo
Cricket Liu and Glenn Sullivan

Many organizations are migrating workloads to the cloud as a key component to their Network Transformation Initiatives. New first-party research conducted
by Enterprise Strategy Group (ESG) found that organizations not leveraging enterprise-grade DDI experienced 44% more quarterly cloud outages than
organizations leveraging enterprise-grade DDI. Purpose-built DDI is a key pillar to a successful Network Transformation. Join us April 23rd for an expert dis…

Beyond the Basics: Elevating Network Transformation with Enterprise-Grade DDI

Beyond the Basics: Elevating Network Transformation with Enterprise-Grade DDI

Channel Logo
Cricket Liu and Glenn Sullivan

Many organizations are migrating workloads to the cloud as a key component to their Network Transformation Initiatives. New first-party research conducted
by Enterprise Strategy Group (ESG) found that organizations not leveraging enterprise-grade DDI experienced 44% more quarterly cloud outages than
organizations leveraging enterprise-grade DDI. Purpose-built DDI is a key pillar to a successful Network Transformation. Join us April 23rd for an expert dis…

Beyond the Basics: Elevating Network Transformation with Enterprise-Grade DDI

Beyond the Basics: Elevating Network Transformation with Enterprise-Grade DDI

Channel Logo
Cricket Liu and Glenn Sullivan

Many organizations are migrating workloads to the cloud as a key component to their Network Transformation Initiatives. New first-party research conducted
by Enterprise Strategy Group (ESG) found that organizations not leveraging enterprise-grade DDI experienced 44% more quarterly cloud outages than
organizations leveraging enterprise-grade DDI. Purpose-built DDI is a key pillar to a successful Network Transformation. Join us April 23rd for an expert dis…

How to Protect Your IP While Accelerating Electronic Product Development

How to Protect Your IP While Accelerating Electronic Product Development

Channel Logo
Jeff Geoffroy, Director of Product Marketing at Altium 365 & Artjom Orekhov, Director of Cloud Platform Engineering at Altium

Join us for a live webinar where we'll showcase the capabilities of Altium 365 Organizational Security Package. Discover how you can protect your sensitive
information and seamlessly integrate with existing security frameworks. What You Will Learn: - Seamlessly integrate your Identity Management systems like
SSO and MFA to enhance security and operational efficiency. - Learn what events we track and utilize Altium 365 SIEM APIs to funnel these details into your …

AI in Cybersecurity: Elevating DNS Security and Threat Detection

AI in Cybersecurity: Elevating DNS Security and Threat Detection

Channel Logo
Yaelle Harel, Senior Product Marketing Manager

Join us for an insightful webinar that dives into the transformative role of Artificial Intelligence (AI) in modern cybersecurity. This session will explore how AI
can accelerate and enhance DNS-based threat detection capabilities through a real-world example of Domain Generated Algorithms (DGAs). You will learn
What a DGA is and its role in cyber threats How our innovative ML-based algorithm accelerates DGA detection The value of EfficientIP’s AI-driven DNS Sec…