After lots of good BBQ and craft beer in Austin last week, I’ve had a chance to reflect on what I saw at the Openstack conference. If we weren’t already convinced that carriers are determined to break vendor lock-in and deploy Openstack and NFV—no matter what the challenges— we should be now.read more
DDoS for Ransom is a growing concern. In the past year, we have witnessed an exponential increase in the number of ransom threats companies have received from hackers. A few groups emerged at the forefront of this trend: DD4BC, Armada Collective, and allegedly Lizard Squad.
Back in November 2015 Radware got up close and personal with DDoS extortionist Armada Collective when we helped mitigate an attack against ProtonMail. The Armada Collective threatens companies with a Denial of Service attack if they do not pay their ransom in Bitcoin within a certain time frame. Along with the note, Armada Collective launches sample attacks against their victim’s network in demonstration of their power.read more
The virtualized networks we build today are millennial networks for millennial expectations. I was talking to someone the other day about how the millennial generation expects instant gratification and rewards on demand. We can watch an entire television series in single night. We can order something online and have it delivered to our door the following day. In a way, we are providing access to applications and data in a similar way through virtualization strategies.read more
Attending the NFV World Congress last week gave me a chance to talk to many carriers about their migration into a virtualized network. Many have made big progress. In fact, Verizon has already begun to deploy an OpenStack environment.
Carriers continue to aggressively push into NFV with NTT announcing they will virtualize 75% of their network by 2020. AT&T and now NTT Docomo and many others have either declared their virtualization goals or have begun to take active steps toward achieving them.read more
So you have the latest in DDoS and WAF protection. You’ve ensured your company is protected against SQL injections and cross-site scripting, but then an employee clicks on a pop-up to win a free iPad and your network has suddenly been infiltrated with malicious code. What happened?
In analyzing the 2015 cyber trends, we have found that cyber attackers can effectively defeat IP-based defense systems by launching application-level attacks that originate from real – but dynamic – IP addresses. One of the most common variations of dynamic IP attacks is clickjacking.read more
In my last blog, I talked a little about the general principles of the cyberattack marketplace. Today, we will take a closer look at the Darknet. There is so much talk these days about the Darknet. It’s the stuff of crime novels – a hotbed of criminal activity where anything can be bought and sold.
While that is true, the Darknet also provides an anonymizing layer to journalists and activists around the world who fight for the freedom of information and privacy. It is often a place where they can securely and anonymously communicate with their contacts.read more
For all industries, web performance is an essential part of the online equation, and if there’s an industry that’s been disrupted by the web as greatly as the retail sector, it has to be news and media, making every aspect of the online experience even more important.
At the turn of this century, one of the key terms and concepts in university news and media courses was “media convergence” – that is, all things media coming together via the internet and web-enabled devices to an exploding user base.read more
Public Transportation is the lifeblood of any economy and the circulatory system of modern day societies. From train, plane to automobile, the public transportation apparat is one of the core achievements in a highly functioning society. It includes everything from the roads, shipping ports and airports which are funded and maintained by public investments to wholly run publicly available train and bus systems.read more