
Advanced protection for web applications in Azure with Radware’s Microsoft Security integration
This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA here. The state of application security Companies face a wide range of security challenges, such as Open Source Foundation for Application Security Project (OWASP) ... continue reading

Exploiting a crisis: How cybercriminals behaved during the outbreak
In the past several months, seemingly conflicting data has been published about cybercriminals taking advantage of the COVID-19 outbreak to attack consumers and enterprises alike. Big numbers can show shifts in attacker behavior and grab headlines. Cybercriminals did indeed adapt ... continue reading
CISO stress-busters: post #1 overcoming obstacles
As part of the launch of the U.S. space program’s moon shot, President Kennedy famously said we do these things “not because they are easy, but because they are hard.” The same can be said for the people responsible for ... continue reading
Lessons learned from the Microsoft SOC—Part 3c: A day in the life part 2
This is the sixth blog in the Lessons learned from the Microsoft SOC series designed to share our approach and experience from the front lines of our security operations center (SOC) protecting Microsoft and our Detection and Response Team (DART) ... continue reading
Mobile security—the 60 percent problem
Off the top of your head, what percentage of endpoints in your organization are currently protected? Something in the 98 percent+ range? Most enterprises would say having fewer than 2 percent of endpoint devices lacking adequate security would be considered ... continue reading
A Journey to Holistic Cloud Protection with the Microsoft 365 Security Stack – Part 1 – Overview
Welcome everyone! My name is James Key and I’ll be your guide as we take a journey through the possibilities of holistic cloud protection with the Microsoft 365 security stack. I am a Premier Field Engineer at Microsoft who specializes ... continue reading

Protect workloads still running on Windows Server 2008 and 2008 R2
Over the last couple of years, we havesharedwhy it is business critical to migrate and upgrade apps and services running on Windows Server 2008 and 2008 R2. As you are aware, on January 14th, 2020, support for Windows Server 2008 ... continue reading

How to secure your IoT deployment during the security talent shortage
Businesses across industries are placing bigger and bigger bets on the Internet of Things (IoT) as they look to unlock valuable business opportunities. But time and time again, as I meet with device manufacturers and businesses considering IoT deployments, there ... continue reading
Hyper-V Powering Windows Features
December 2019 Hyper-V is Microsoft’s hardware virtualization technology that initially released with Windows Server 2008 to support server virtualization and has since become a core component of many Microsoft products and features. These features range from enhancing security to empowering ... continue reading
Top 6 email security best practices to protect against phishing attacks and business email compromise
Most cyberattacks start over email—a user is tricked into opening a malicious attachment, or into clicking a malicious link and divulging credentials, or into responding with confidential data. Attackers dupe victims by using carefully crafted emails to build a false ... continue reading
Streaming Media Content Delivery Network

Pre-tested and ready to stream your media library directly to customers.
View Solution