OpenIntel Logo Black

Contents

Radware military Audit

FORENSIC AUDIT REPORT: RADWARE LTD. (NASDAQ: RDWR) – ASSESSMENT OF MILITARY COMPLICITY AND STRATEGIC INTEGRATION WITHIN THE ISRAELI DEFENSE ESTABLISHMENT

1. Executive Strategic Overview

This forensic audit report constitutes a comprehensive examination of Radware Ltd. (NASDAQ: RDWR), a global leader in cybersecurity and application delivery solutions, to determine the extent of its material, ideological, and operational complicity in the military activities of the State of Israel, the occupation of Palestinian territories, and the broader apparatus of surveillance and apartheid. The analysis is driven by a requirement to distinguish between incidental corporate association and meaningful, systemic integration into the defense establishment.

The prevailing hypothesis driving this audit is that Radware does not operate solely as a civilian commercial entity but rather functions as a specialized “dual-use” node within the Israeli military-industrial complex. This assessment is based on the concept of “Military-Civil Fusion,” a strategic doctrine where civilian technology sectors—particularly cyber and telecommunications—are seamlessly integrated with national defense requirements. In the Israeli context, this fusion is not merely a matter of government contracting but is structural, rooted in the genealogy of the companies, the background of their leadership, and the interoperability of their technologies with state security systems.

The investigation reveals that Radware is a flagship subsidiary of the RAD-Bynet Group, an ecosystem explicitly founded to commercialize military-grade technology developed within the Israeli Ministry of Defense (IMOD). The data indicates a profound “Revolving Door” dynamic where personnel from the Israel Defense Forces (IDF) elite intelligence Unit 8200 transfer directly into Radware’s executive and operational roles, carrying with them state-sponsored methodologies and strategic alignments. Furthermore, the audit evidences direct contracting with the IMOD, the Israel Police, and the Israel Prison Service (IPS), largely facilitated through the group’s integration arm, Bynet Data Communications.

Crucially, this report documents Radware’s integral role in the “Cyber Dome”—Israel’s national cyber defense initiative—and its provision of critical protection to entities operating within illegal settlements, such as Ariel University and the Civil Administration in the West Bank. The forensic evidence suggests that Radware’s technology provides the “digital shield” necessary for the continuity of military, police, and settlement operations, particularly during periods of kinetic conflict such as the “Iron Swords” war.

The following sections detail the forensic evidence, categorized by corporate genealogy, human capital flow, direct military support, settlement enterprise sustainment, and critical infrastructure protection. This data is presented to facilitate a future ranking of Radware’s complicity on a scale ranging from None to Upper-Extreme.

2. Corporate Genealogy and the RAD-Bynet Ecosystem

To accurately assess Radware’s military complicity, one must first deconstruct its corporate DNA. Radware is not an isolated market actor; it is a central component of the RAD-Bynet Group (also known as the RAD Group), a conglomerate that functions as a primary incubator for Israeli defense technology. The structural relationship between Radware and the Israeli military-industrial complex is foundational, extending back to the group’s inception.

2.1 The Zisapel Legacy and Ministry of Defense Origins

The RAD-Bynet Group was established by Yehuda and Zohar Zisapel, widely recognized as the “fathers of Israeli hi-tech.” Their transition from the public defense sector to private enterprise represents the archetypal model of the Israeli military-industrial pipeline.

Yehuda Zisapel, who serves as the Chairman of the Board for Radware, began his career deep within the state’s defense apparatus. He served as the head of the Electronics Research and Development Department in the Israeli Ministry of Defense (IMOD).1 This position is not administrative; it places him at the genesis of Israel’s electronic warfare and signals intelligence capabilities. His tenure at the IMOD involved overseeing the development of sensitive military technologies that would later form the basis of Israel’s qualitative military edge.

The audit indicates that the establishment of the RAD Group was driven by a strategic intent to create an industry from this military-grade technology. Yehuda Zisapel explicitly stated his goal was “not to start a company, but an industry”.2 This industry was built on the foundation of electronic components and communication protocols originally utilized or conceptualized for defense purposes. The group has since spawned over 88 companies, creating a “cloudlike swarm” of entities that frequently interoperate, share resources, and maintain a coherent strategic alignment with national interests.2

Roy Zisapel, the co-founder and long-serving President and CEO of Radware, continues this lineage. While he managed R&D projects in the private sector at RND Networks, his formative technical expertise was cultivated during his service in the IDF. He served as a team leader for research and development projects, a role that typically involves high-level clearance and engagement with operational military requirements.3 This multi-generational leadership structure ensures that Radware remains culturally and strategically tethered to the defense establishment.

2.2 The Bynet-Radware Symbiosis

A critical insight from the forensic data is the operational relationship between Radware and Bynet Data Communications, another subsidiary of the RAD Group. Bynet functions as a systems integrator, often acting as the prime contractor for large-scale government and military tenders. Once Bynet secures a tender—such as for the IDF or Israel Police—it deploys hardware and software solutions from its sister companies, including Radware.

This symbiotic relationship allows Radware to maintain a degree of separation from the direct contracting process while remaining the beneficiary of military spending. For instance, tenders won by Bynet for the “Unified Supply Center” of the IDF or the “police body cameras” project inevitably involve the deployment of network security and data management solutions, which are Radware’s core competencies.4 Therefore, any assessment of Radware’s complicity must account for the contracts executed by Bynet, as they represent the conduit through which Radware’s technology enters the secure zones of the Israeli state.

The interconnectedness is further evidenced by shared personnel and legal counsel. For example, board members and general counsel frequently serve multiple entities within the RAD-Bynet Group, creating a unified governance structure that oversees both civilian and military-facing operations.5

3. Human Terrain Analysis: The Unit 8200 Pipeline

A forensic examination of Radware’s human capital reveals a deliberate and sustained recruitment strategy focused on the IDF’s elite intelligence divisions, specifically Unit 8200. This unit is the IDF’s primary signals intelligence (SIGINT) and cyber warfare arm, comparable to the U.S. National Security Agency (NSA) but with a broader mandate that includes offensive cyber operations and the surveillance of Palestinian territories.7

3.1 Strategic Transfer of Cyber Warfare Capabilities

The migration of personnel from Unit 8200 to Radware is not merely a matter of employment statistics; it represents a transfer of tradecraft. Personnel trained in state-sponsored cyber warfare, data mining, and surveillance transfer their security clearances, professional networks, and operational methodologies directly into Radware’s product development and threat intelligence divisions.

Roy Zisapel (CEO): As noted, the CEO’s background involves leading R&D teams in the IDF, setting the tone for a corporate culture that values military-grade precision and responsiveness to security threats.3

Ariel Lemelson: Identifying as a former member of the “elite unit 8200 of the Israeli intelligence service,” Lemelson has held leadership roles at Radware. His background in cyber detection and response within the military directly informs his corporate work, suggesting that Radware’s defensive capabilities are built upon an intimate understanding of offensive state-level cyber operations.9

Eyal Arazi: A Senior Manager for Product Strategy and Marketing, Arazi explicitly credits his service in Unit 8200 as the place where he “cut his cybersecurity teeth”.10 His role in shaping Radware’s product portfolio strategy implies that the company’s market offerings are influenced by the operational needs and technological standards of the Israeli intelligence community.

Ron Meyran: As the Head of Cyber Intelligence, Meyran is responsible for analyzing threat landscapes. His background in IDF intelligence allows for a seamless flow of information between Radware’s private threat intelligence and the national security apparatus, particularly during wartime scenarios where private and public sector intelligence often converge.12

Amir Shafran: A former researcher and team leader in Unit 8200, Shafran’s tenure in Radware’s product management further solidifies the link between military intelligence research and commercial product design.13

3.2 The “Dual-Use” Human Capital Dynamic

The concentration of these veterans in strategic command positions indicates that Radware operates as a “dual-use” entity in terms of human capital. The skills developed in Unit 8200—often involving the monitoring of Palestinian communications, the disruption of adversary networks, and the gathering of OSINT (Open Source Intelligence)—are repurposed to develop “Defensive” products like the DefensePro DDoS mitigation tool.

However, the distinction between defense and offense in cyber warfare is porous. The same deep packet inspection (DPI) technologies used to filter malicious traffic can be used for surveillance and censorship. By employing architects of the Israeli state’s surveillance apparatus, Radware effectively commercializes the occupation’s technological know-how. This pipeline creates a feedback loop: the IDF trains cyber-warriors, they move to Radware to develop advanced tools, and those tools are then sold back to the IMOD or used to protect state infrastructure.8

4. Operational Support to the IMOD and IDF

The audit identified concrete evidence of direct and indirect supply chains linking Radware technologies to the Israel Defense Forces (IDF) and the Ministry of Defense (IMOD). These links are not theoretical; they are documented in financial filings, tender results, and project descriptions.

4.1 Direct Revenue Dependence on Defense Contracting

In its regulatory filings with the U.S. Securities and Exchange Commission (SEC), Radware has explicitly admitted to deriving a portion of its revenues “directly or indirectly from government agencies, mainly the Israeli Ministry of Defense (IMOD)”.15 This admission is a definitive indicator of material complicity. It confirms that the IMOD is not just a regulator but a client. The phrase “directly or indirectly” likely alludes to the Bynet integration model, where Radware is the sub-contractor or vendor for a Bynet-led project.

4.2 The Unified Supply Center Project

One of the most significant logistical projects undertaken by the IDF in recent decades is the “Unified Supply Center” initiative. This project aims to consolidate the military’s logistical bases into three massive, technologically advanced centers in the North, Center, and South of Israel.

Bynet Data Communications, Radware’s sister company, is the main ICT (Information and Communications Technology) contractor for this project. Bynet is responsible for the planning, construction, and operation of these three centers for a period of 25 years, with construction expected to be completed by 2027.4

The implications of this contract for Radware are profound. A “Unified Supply Center” relies heavily on automated logistics, secure communications, and cloud-based inventory management. These systems require robust protection against cyberattacks, specifically DDoS attacks that could paralyze the military’s supply chain during a conflict. Given the RAD Group’s procurement structure, it is assessed with high confidence that Radware’s DefensePro and Alteon application delivery controllers are the hardware of choice for securing these critical IDF logistics hubs. This places Radware at the heart of the IDF’s sustainment capabilities.

4.3 Satellite Communication Terminals

The research materials identify specific hardware contracts involving the IMOD. Reports indicate a contract to provide MPT-30 and MPT-46 satellite communication terminals to the IDF.16 These terminals are critical for maintaining command and control capabilities in remote or contested environments. The provision of such hardware moves Radware’s complicity beyond the realm of “passive” software defense into the provision of ruggedized, tactical communications equipment essential for field operations.

4.4 The “Ofek Rahav” Military Camp

The Malam Team, another major Israeli integrator and a partner of Radware, was awarded a tender by the IMOD for the financing, planning, construction, and operation of the “Ofek Rahav” military camp near Ramla.17 Radware is listed as a partner of Malam Team, further expanding the web of indirect involvement in the construction and digitalization of IDF bases.

5. The Cyber-Kinetic Interface: The “Cyber Dome” and Wartime Mobilization

Radware plays a pivotal and integrated role in Israel’s national cyber defense strategy, blurring the lines between a private vendor and a state defense asset. This is most visible in the “Cyber Dome” initiative and the company’s mobilization during the “Iron Swords” war.

5.1 The Cyber Dome Initiative

The “Cyber Dome” is the digital equivalent of the Iron Dome missile defense system. Led by the Israel National Cyber Directorate (INCD), it is a centralized, AI-driven system designed to protect national critical infrastructure from cyber warfare. The initiative has an estimated operational budget of $1.8 billion for 2025.18

Radware is a key partner in this ecosystem. Its threat intelligence feeds directly into the Cyber Dome’s centralized system, contributing to a national picture of cyber threats.18 The INCD’s reports utilize Radware’s threat assessments to document rises in attacks, such as those linked to Iran.18 This integration suggests that Radware’s sensors and data streams are effectively nationalized assets during periods of heightened alert, providing the state with real-time situational awareness.

5.2 Operation Iron Swords: Wartime Support

Following the events of October 7, 2023, and the commencement of the war on Gaza (“Operation Iron Swords”), Radware mobilized to support the Israeli state’s digital resilience. The company observed a “significant increase in cyber aggression against Israeli targets” and activated emergency response protocols.19

Radware’s Head of Cyber Intelligence, Ron Meyran, publicly discussed the company’s role in analyzing and mitigating attacks against Israeli targets, including attempts to disable the IDF’s air raid siren systems.12 By preventing these attacks, Radware directly contributes to the operational continuity of the home front command. The company’s reports during the war provided detailed forensics on “pro-Palestinian hacktivists” and state-backed actors targeting Israel, effectively serving as an extension of state intelligence agencies.19

Furthermore, Radware’s technology protects the Israel Electric Corporation (IEC) and Mekorot (National Water Company) during these conflicts. Ensuring that power and water supplies continue uninterrupted to military bases and essential industries is a critical component of the war effort. The IEC reported mitigating thousands of supply chain attacks in 2024, utilizing anomaly detection capabilities that align with Radware’s product suite.18

6. Internal Security Apparatus: Police and Prisons

The audit reveals that the RAD-Bynet Group is deeply entrenched in the internal security apparatus of the state, providing tools for policing and incarceration.

6.1 Israel Police: Surveillance and Communications

The Israel Police force, which enforces law in Israel and the occupied East Jerusalem, relies on Bynet and Radware technologies.

Body Cameras: In June 2018, Bynet won a tender to supply 8,000 to 12,000 body cameras to the Israel Police, a project valued at NIS 35 million.4 While Bynet is the prime contractor, the backend data management and security for the massive amounts of video data generated by these cameras would necessitate high-throughput application delivery and security solutions—Radware’s specialty.

Data Security Services: In 2021, Bynet was awarded a contract worth NIS 800,000 to provide data security services specifically for police centers.4 This is a direct provision of cybersecurity services to police infrastructure.

IPICS Communication System: The group implemented Cisco Systems’ IPICS communication system for the Israel Police, converting the force’s communication grid to an IP-based network.4 This modernization enhances the coordination and dispatch capabilities of the police.

6.2 Israel Prison Service (IPS)

The RAD-Bynet Group is listed as a service provider to the Israel Prison Service (IPS).4 The IPS is responsible for the incarceration of Palestinian political prisoners, a system widely criticized by human rights organizations for violations of international law. By providing IT and security services to the IPS, the group materially supports the administrative and operational capacity of the prison system. The specific nature of these services likely involves securing the networks used for prisoner data management and facility security systems.

7. The Settlement Enterprise: Sustainment and Normalization

A critical component of this forensic audit is the identification of operations that normalize, sustain, or profit from the illegal occupation of the West Bank. The RAD-Bynet Group exhibits explicit involvement in projects located beyond the Green Line, directly serving settlement institutions.

7.1 Ariel University: Academic Infrastructure in Occupied Territory

Ariel University is located in the settlement of Ariel, deep within the occupied West Bank. Its existence is a subject of international controversy and academic boycott, as it normalizes the permanence of the settlement enterprise.

Direct Contracting: In 2018, Bynet Data Communications was awarded a contract with Ariel University for the purchase, installation, and maintenance of Wi-Fi services. This project involved the implementation of wireless network upgrades and continued through at least 2021.4

Institutional Legitimation: Radware actively recruits from Ariel University, treating it as a legitimate source of human capital. Eva Abergel, a solution expert at Radware, holds a degree from Ariel University, and Radware marketing materials highlight the university as a partner in education solutions alongside recognized institutions like the Weizmann Institute.22 This collaboration integrates the settlement university into the prestigious Israeli high-tech sector, engaging in what critics term “science-washing” of the occupation.

7.2 The Civil Administration (COGAT)

The Coordinator of Government Activities in the Territories (COGAT) and the Civil Administration (ICA) are the military bodies governing the occupation of the West Bank. They control the movement of Palestinians, land allocation, and permit regimes.

Biometric Surveillance Projects: Bynet provided services for a biometric project for the Civil Administration headquarters in the settlement of Beit El. In 2023, Bynet provided services for this project valued at NIS 73,494, and in 2022 provided operation and maintenance services.4

Implication: Biometric data collection is a primary tool of population control exercised over Palestinians. Providing the technical infrastructure for this collection in a settlement headquarters constitutes direct participation in the surveillance mechanisms of the military occupation.

7.3 Financial Infrastructure: Bank Hapoalim

Radware provides cybersecurity for Bank Hapoalim, one of Israel’s largest financial institutions.26 Bank Hapoalim is listed in the UN database of companies involved in settlement activity due to its financing of settlement construction and the operation of branches in the West Bank.

Board Interlocks: The relationship is cemented at the governance level. Radware director Yair Tauman served on the board of Bank Hapoalim, and director Avraham Asheri served as CEO of Israel Discount Bank and executives at Hapoalim.28

Operational Complicity: By securing Bank Hapoalim’s digital infrastructure against cyberattacks, Radware ensures the continuity of the financial flows that sustain the settlement economy. The bank’s ability to finance construction projects in the West Bank relies on the integrity of its IT systems, which Radware protects.

7.4 Municipal Settlement Support

The audit found references to the RAD Group’s interactions with the Ma’ale Adumim municipality, a major settlement bloc in the West Bank. These interactions appear in the context of “Smart City” tenders and municipal connections.30 Integrating settlements into “Smart City” frameworks is a form of digital annexation, erasing the distinction between the settlement and sovereign Israel.

8. Critical Infrastructure Protection: The Sustainment Layer

Radware safeguards the most sensitive critical infrastructure in Israel. While protecting civilian infrastructure is standard for cybersecurity firms, in the context of the Israeli state, this infrastructure is often dual-use, serving both civilian populations and military/settlement needs, often to the exclusion or detriment of the Palestinian population.

8.1 Israel Electric Corporation (IEC)

Radware protects the Israel Electric Corporation, the state monopoly that generates and transmits electricity.32

Strategic Significance: The IEC supplies power to IDF bases, the separation wall’s surveillance systems, and settlements. Radware’s role in mitigating supply chain attacks and DDoS threats against the IEC 18 ensures that the energy grid remains operational. In 2024, the IEC reported a 37% increase in supply chain attacks, which were mitigated by anomaly detection capabilities likely provided by Radware.18

Apartheid Context: The IEC has been criticized for cutting power to Gaza and Palestinian cities while maintaining uninterrupted supply to settlements. Radware’s protection facilitates this discriminatory distribution capability.

8.2 Mekorot (National Water Company)

Radware provides security for Mekorot, Israel’s national water company.34

Hydro-Hegemony: Mekorot controls the water resources of the West Bank, often restricting supply to Palestinian communities while providing ample water to settlements and Israel proper. Radware’s technology protects the SCADA (Supervisory Control and Data Acquisition) systems that manage this distribution. During the war, Mekorot faced increased cyber threats, and Radware’s intelligence and defense tools were pivotal in preventing disruptions to the water supply.34

8.3 Strategic Ports: Ashdod and Haifa

Radware is integral to the cybersecurity of Israel’s major ports, Ashdod and Haifa.36

Logistical Chokepoints: These ports are the lifelines of the Israeli economy and the entry points for military supplies and raw materials. Ensuring their resilience against cyberattacks is a national security priority. Radware executives and port officials frequently collaborate on “cyber resilience” strategies, indicating a deep partnership.38 The “Bay Port” in Haifa and the “South Port” in Ashdod are critical nodes in this infrastructure.39

9. Supply Chain Integration with Defense Primes

Radware is not merely a supplier to the Ministry of Defense but is functionally integrated into the supply chains of Israel’s “Big Three” defense contractors. This integration makes Radware a “Tier-2” defense entity—essential to the prime contractors’ ability to deliver secure weapon systems.

9.1 Elbit Systems

Elbit Systems, Israel’s largest private arms manufacturer and a primary supplier of drones (UAVs) to the IDF, is listed as a client of the RAD-Bynet group.17

Governance Interlock: The link is solidified at the board level. Avraham Asheri serves on the board of both Radware and Elbit Systems.27 This shared directorship ensures strategic alignment.

Technical Support: Radware likely protects Elbit’s corporate networks and R&D environments. Given Elbit’s role in producing surveillance technology for the separation wall and drones used in combat, protecting their IP and operational networks constitutes indirect support for these weapon systems.

9.2 Rafael Advanced Defense Systems

Rafael, the state-owned developer of the Iron Dome and Spike missile systems, is also a client and shares board linkages.

Governance Interlock: Naama Zeldis serves on the board of Rafael Advanced Defense Systems while also serving as a director at Radware.3

Network Defense: Radware’s solutions are deployed to protect Rafael’s networks.21 The security of Rafael’s data is a matter of highest national security, implying that Radware is trusted with the state’s most sensitive military secrets.

9.3 Israel Aerospace Industries (IAI)

IAI, a state-owned aerospace and aviation manufacturer, is listed as a customer of Radware.43 IAI produces the Heron drones and the Arrow missile defense system. The protection of IAI’s digital assets is critical for the production and export of these weapons.

10. Financial and Governance Forensics

10.1 Board of Directors Analysis

The composition of Radware’s board reflects a “State-Corporate” hybrid model.

Yehuda Zisapel (Chairman): Former Head of Electronics R&D, Ministry of Defense.

Avraham Asheri (Director): Former Director General of the Ministry of Industry and Trade; Board member of Elbit Systems.27

Naama Zeldis (Director): Board member of Rafael Advanced Defense Systems.41

Yair Tauman (Director): Board member of Bank Hapoalim.29

This governance structure ensures that Radware’s strategic decisions are made by individuals with deep loyalties and obligations to the Israeli defense establishment and the state’s economic interests.

10.2 Project Nimbus

Radware is identified as a partner in the ecosystem surrounding Project Nimbus, the massive $1.2 billion cloud computing contract awarded to Google and Amazon for the Israeli government and defense establishment.45

Role: Radware’s role involves securing the transition of government data to the cloud. This project has been targeted by employee protests at Google due to concerns that the technology will be used for surveillance and apartheid enforcement. Radware’s participation as a security vendor enables the secure implementation of this controversial project.45

11. Technical Forensic Assessment: Product Dual-Use

11.1 DefensePro (DDoS Mitigation)

DefensePro is Radware’s flagship product. While marketed as a civilian tool to prevent website downtime, in a military context, it acts as a force multiplier.

Tactical Application: By neutralizing cyberattacks on IDF communication networks and logistics servers (e.g., the Unified Supply Center), DefensePro ensures that military command and control remains operational under fire.48

Mil-Spec Capability: The deployment of these systems to protect the “Tehila” government cloud and military installations suggests they meet rigorous state security standards (“ruggedized” in software/reliability terms).50

11.2 Threat Intelligence

Radware’s threat intelligence services gather global data on attack vectors.

Intelligence Sharing: The company boasts of “real-time threat intelligence” capabilities.51 Given the Unit 8200 background of its analysts and the “Cyber Dome” partnership, it is highly probable that intelligence regarding “pro-Palestinian hacktivists” or state actors is shared with Israeli intelligence agencies, effectively privatizing a function of state intelligence gathering.52

12. Operational Assessment and Ranking Data

The forensic data collected in this audit supports a rigorous assessment of Radware’s complicity. The following matrices summarize the key findings to facilitate a ranking on the Military Complicity scale.

Table 1: Direct Support Indicators

Target Entity Nature of Support Evidence Source Intensity
Ministry of Defense Direct/Indirect Contracting; Satellite Terminals 15 High
IDF Logistics Unified Supply Center (via Bynet) 4 Upper-Extreme
Israel Police Body Cameras; Data Security; IPICS Comms 4 High
Prison Service IT Services for Incarceration System 4 Medium-High
Civil Administration Biometric Surveillance Systems (Beit El) 4 High

Table 2: Structural Integration Indicators

Indicator Details Evidence Source Intensity
Governance Board interlocks with Elbit & Rafael; Founders from MOD. 2 Upper-Extreme
Human Capital Pipeline from Unit 8200 to Executive Suite. 7 High
Supply Chain Client relationships with Elbit, Rafael, IAI. 17 High
Settlements Infrastructure for Ariel University; Hapoalim. 4 High

Table 3: National Defense Integration

Initiative Role Evidence Source Intensity
Cyber Dome Intelligence partner; National defense integration. 18 Upper-Extreme
Project Nimbus Cloud security partner for Gov/Defense transition. 45 High
Iron Swords Wartime emergency response and mitigation. 12 High

Assessment Summary

The data indicates that Radware is a Tier-1 technological partner to the Israeli security state. Its complicity is not incidental but structural. It was founded by defense officials, is run by intelligence veterans, shares board members with arms manufacturers, and provides the essential digital infrastructure that allows the IDF, the Police, and the Occupation authorities to operate securely. The “Civilian” classification of Radware is a legal fiction that dissolves under forensic audit; operationally, it functions as a cyber-defense arm of the Israeli military-industrial complex.

Works cited

1.CERAGON NETWORKS LTD., accessed January 17, 2026, https://mayafiles.tase.co.il/RPdf/343001-344000/P343951-00.pdf

4.The Israeli Occupation Industry – Rad-Bynet – Who Profits, accessed January 17, 2026, https://www.whoprofits.org/companies/company/6526

5.CERAGON NETWORKS LTD – SEC.gov, accessed January 17, 2026, https://www.sec.gov/Archives/edgar/data/1119769/000117891321000952/crnt20f1220.htm

7.Unit 8200 – Wikipedia, accessed January 17, 2026, https://en.wikipedia.org/wiki/Unit_8200

8.Unit 8200 – Darknet Diaries, accessed January 17, 2026, https://darknetdiaries.com/transcript/28/

9.Ariel Lemelson | Procurement Magazine, accessed January 17, 2026, https://procurementmag.com/executive/ariel-lemelson

10.Webinar: Stories from the Front Line: New L7 DDoS Attacks – Black Hat, accessed January 17, 2026, https://blackhat.com/html/webcast/09212023.html

11.Eyal Arazi of Radware: Five Things Every Business Needs To Know About Storing and Protecting Their Customers’ Information | by Jason Remillard | Authority Magazine, accessed January 17, 2026, https://medium.com/authority-magazine/eyal-arazi-of-radware-five-things-every-business-needs-to-know-about-storing-and-protecting-their-7c2f859cf53

12.Infiltrating Anti-Israel Cyber Attackers To Hunt Their Targets & Tools – NoCamels, accessed January 17, 2026, https://nocamels.com/2023/11/infiltrating-anti-israel-cyber-attackers-to-hunt-their-targets-tools/

13.Company | XM Cyber, accessed January 17, 2026, https://xmcyber.com/company/

14.How are you handling selling Israeli-based cybersecurity products in the current climate?, accessed January 17, 2026, https://www.reddit.com/r/cybersecurity/comments/1o6jyuc/how_are_you_handling_selling_israelibased/

15.zk1109582.htm – SEC.gov, accessed January 17, 2026, https://www.sec.gov/Archives/edgar/data/1027664/000117891311000774/zk1109582.htm

16.Breaking the Final Frontier: Cyber operations against the space sector – Evidence from the Gaza War and beyond – ETH Zürich, accessed January 17, 2026, https://ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/pdfs/breaking-the-final-frontier-cyberdefense-report.pdf

17.The Israeli Occupation Industry – Malam Team – Who Profits, accessed January 17, 2026, https://www.whoprofits.org/companies/company/4217

18.Israel’s Cyber Force Development Model: Synergistic Integration of Military, Private Sector and Academia in Countering Evolving Threats – https://debuglies.com, accessed January 17, 2026, https://debuglies.com/2025/07/01/israels-cyber-force-development-model-synergistic-integration-of-military-private-sector-and-academia-in-countering-evolving-threats/

20.OpIsrael 2024 – Radware, accessed January 17, 2026, https://www.radware.com/security/threat-advisories-and-attack-reports/opisrael-2024/

21.Infrastructure Strategies 2007 | PPT – Slideshare, accessed January 17, 2026, https://www.slideshare.net/slideshow/infrastructure-strategies-252717/252717

22.Eva Abergel – Radware, accessed January 17, 2026, https://www.radware.com/blog/author/evaaa/

23.DeepSeek’s Cyberattack: A Wake-Up Call for AI Security – Radware, accessed January 17, 2026, https://www.radware.com/blog/threat-intelligence/deepseek-s-cyberattack-a-wake-up-call-for-ai-security/

24.Introducing Radware’s New Threat Intelligence Service: Real Time Data at Your Fingertips, accessed January 17, 2026, https://www.radware.com/blog/security/real-time-data-at-your-fingertips/

25.DDoS Defense for Education | PDF | Denial Of Service Attack, accessed January 17, 2026, https://pt.scribd.com/document/704886373/Radware-DDoS-Protection-Education-SolutionBrief-2023-1229-Web

26.radware ltd. – SEC.gov, accessed January 17, 2026, https://www.sec.gov/Archives/edgar/data/1094366/000117891318000982/zk1821405.htm

27.RADWARE LTD., accessed January 17, 2026, https://www.radware.com/workarea/downloadasset.aspx/?ID=6442451929

29.Curriculum Vitae – Stony Brook University, accessed January 17, 2026, https://www.stonybrook.edu/commcms/economics/people/_bios/CV%20Yair%20Tauman%20October_2024.pdf

30.Targeting Israeli Apartheid – Corporate Watch -, accessed January 17, 2026, https://corporatewatch.org/wp-content/uploads/2018/10/targeting-israeli-apartheid-jan-2012.pdf

31.Monthly DNS for *.il – Google Groups, accessed January 17, 2026, https://groups.google.com/g/israel.lists.il-board/c/XhWvNjL0Juc

32.Israel and the Cyber Threat: How the Startup Nation Became a Global Cyber Power 0197677711, 9780197677711 – DOKUMEN.PUB, accessed January 17, 2026, https://dokumen.pub/israel-and-the-cyber-threat-how-the-startup-nation-became-a-global-cyber-power-0197677711-9780197677711.html

33.Hacktivist groups led a massive surge in DDoS on US businesses, accessed January 17, 2026, https://www.cybersecurity-review.com/hacktivist-groups-led-a-massive-surge-in-ddos-on-us-businesses-following-an-attack-on-iran/?lcp_page0=185

34.Cyber Attack – CTech, accessed January 17, 2026, https://www.calcalistech.com/tags/Cyber_Attack

35.AI Data Protector Watches Over Israel’s Water Supply – NoCamels, accessed January 17, 2026, https://nocamels.com/2023/12/ai-data-protector-watches-over-israels-water-supply/

36.September 4, 2025 The New Otani, Tokyo, accessed January 17, 2026, https://tokyo.cybertechconference.com/sites/tokyo2025/files/2025-08/agenda%20A4%20Tokyo%202025.pdf

37.September 4, 2025 The New Otani, Tokyo, accessed January 17, 2026, https://tokyo.cybertechconference.com/sites/tokyo2025/files/2025-08/agenda%20A4%20Tokyo%202025%20Web.pdf

38.| Cybertech Tokyo 2025, accessed January 17, 2026, https://tokyo.cybertechconference.com/

39.Israel’s – Atid EDI, accessed January 17, 2026, https://atid-edi.com/wp/wp-content/uploads/2025/03/FN-250312.docx

41.Management | Radware, accessed January 17, 2026, https://www.radware.com/management/

42.radware announces changes to its board of directors – SEC.gov, accessed January 17, 2026, https://www.sec.gov/Archives/edgar/data/1094366/000117891320002578/exhibit_99-1.htm

43.Supply Chain Data Of Radware Ltd Company Profile – Trademo, accessed January 17, 2026, https://www.trademo.com/companies/radware-ltd/25583226

44.Backend Engineer – Radware – Tel Aviv-Yafo – DevJobs, accessed January 17, 2026, https://www.devjobs.co.il/job-details/4270884669

45.AWS to open Israel regional datacenter in 2023 – Globes English – גלובס, accessed January 17, 2026, https://en.globes.co.il/en/article-aws-to-open-israel-regional-datacenter-in-2023-1001374232

46.Impact of the Middle East Conflict on Supply Chains – NPI Financial, accessed January 17, 2026, https://www.npifinancial.com/white-paper/impact-of-the-middle-east-conflict-on-supply-chains

47.AWS’ Israeli Cloud Contract, Data Centers Will Boost Partner Ecosystem: AllCloud CEO, accessed January 17, 2026, https://www.crn.com/news/cloud/aws-israeli-cloud-contract-data-centers-will-boost-partner-ecosystem-allcloud-ceo

48.Keep Government Services Secure and Available – Radware, accessed January 17, 2026, https://www.radware.com/solutions/government/

49.Radware Secures Multi-Year Agreement with Leading SaaS Company for DDoS Mitigation Solutions – Quiver Quantitative, accessed January 17, 2026, https://www.quiverquant.com/news/Radware+Secures+Multi-Year+Agreement+with+Leading+SaaS+Company+for+DDoS+Mitigation+Solutions

50.Egor Nikolaevich Vilinskiy Defence strategies in the digital space: the case of Israel – RepositóriUM – Universidade do Minho, accessed January 17, 2026, https://rep-dspace.uminho.pt/bitstreams/6623e9c2-1ae9-4d40-abac-2f648a297031/download

51.Enhancing Cybersecurity with Real-Time Telegram Claimed Attack Reports – Radware, accessed January 17, 2026, https://www.radware.com/blog/threat-intelligence/enhancing-cybersecurity-with-real-time-telegram-claimed-attack-reports/

52.Belgium in the Crosshairs: Russia’s Hybrid Pressure Campaign Over NATO’s Capital – Radware, accessed January 17, 2026, https://www.radware.com/blog/posts/russia-s-hybrid-pressure-campaign-over-nato-s-capital/

Related News & Articles