Nikhil Taneja

Nikhil Taneja is managing director - India, SAARC & Middle East at Radware

Top 5 things to consider when buying a bot mitigation solution

When selecting a bot mitigation solution, companies must evaluate the criteria such as power of attack detection, attack response and threat research to determine which bot best fit their unique needs.
4 MIN READ

Driving license model for bolstering application security: Radware India MD Nikhil Taneja

The real life point-based driving license model could be a good solution for the security of accessing the applications, writes Radware India MD Nikhil Taneja.
3 MIN READ

Battling cyber risks with intelligent automation: Nikhil Taneja, Radware

The proliferation of data from dozens of security products is outpacing the ability of security teams to process it. And budget and talent shortfalls limit the ability for security teams to expand rapidly.
5 MIN READ

5 must have DDoS protection technologies: Click to know

Distributed Denial of Service (DDoS) attacks has entered the 1 Tbps DDoS attack era. However, research shows that DDoS attacks are not just getting bigger; they’re also getting more sophisticated.
5 MIN READ
- Advertisement -

DDoS protection is as good as your SLA, so ask these questions to your DDoS vendor

Many vendors make expansive marketing claims about mitigation capabilities, but when it comes to making contractual commitments to performance, the claims vaporize into thin air. It is fair to say that DDoS protection is only as good as your SLA.
4 MIN READ

Cloud Migration: Here is how you can ensure Cloud security

Too often, organisations assume a certain level of protection from a cloud service provider and don’t take steps to ensure applications and data are just as safe as those housed in the data center.
4 MIN READ

The Top 5 Malware: Here’s what you can do to defeat them

Despite malware being a pivotal attack vector, companies are unable to defend against data-theft malware running wild in their network.
4 MIN READ

Memcached DDoS attack explained: Avoid external traffic to ports used by memcached

A Memcached amplified attack makes use of legitimate third party Memcached servers to send spoofed attack traffic to a targeted victim.
4 MIN READ
- Advertisement -
-Advertisement-