DDoS-for-hire has been around for a while. Until recently, “booters” were known as paid online services used by gamers to initiate DDoS attacks against their opponents to gain a competitive advantage.
Now, DDoS attacks can be launched by anybody with a credit card and a motive. No longer exclusive to gamers and hackers, a competitive DDoS-for-hire market has expanded nearly to the point of commoditization.read more
Since HTTP 1.1 was introduced 17 years ago, the Internet has evolved. This evolution introduced many changes, among them the development and delivery of rich content to users. These improvements enhanced the online experience, but did come at a cost – and the currency was performance. Performance challenges that HTTP 1.1 was never designed to handle.read more
In enterprise environments it is common for an application to be hosted by a pool of servers, either physical or virtual. Over time these applications also go through a lifecycle that consists of security patches, maintenance, upgrades to update capabilities, and changes to keep up with trends such as virtualization, consolidation and deployment in a hybrid cloud environment. For scalability, additional servers may also be deployed.read more
Every good hero needs a trusty guide.
Sherlock Holmes had his Watson. Bruce Wayne had Alfred. Captain Kirk? He had Spock. Today’s information security professionals are no different. They work in the trenches to protect networks and applications and they are the modern day heroes of our digital lives. And thus, a guide for keeping up with the fast evolving cyber-threat landscape is valuable when supporting combat.read more
On Tuesday June 9th, I presented at Light Reading’s Big Telecom Event and spoke about NFV in the mobile network. The event hosted a few thousand attendees for several hot Chicago days by the Lake and the NFV session was well attended.
NFV is a hot topic in the Carrier industry. According to Heavy Reading, nearly 50% of the Carriers said that they are currently testing NFV solutions in their networks and the other 50% claimed they are in active study on the topic.read more
The recent Venom Vulnerability has been open since 2004. The ShellShock Vulnerability released last year was open for 25 years! What is happening now that is causing us to just get around to finding out about these flaws?read more
DDoS attacks are no longer just a nuisance and they can cause lasting damage. Organizations that ignore this threat often learn the high costs involved in the damage from these attacks – ranging from mild service degradation and to extended service outage. According to Aberdeen Group research, the cost of a one second delay in website load time can translate to a 7% reduction in conversion rate and up to $2.5 million in losses per year. The cost of outage? That can reach nearly half a million dollars per hour.read more
David Monahan is Research Director for Enterprise Management Associates (EMA) and is a featured guest blogger.
I was recently briefing with a customer when a question was raised about Microsoft Forefront Threat Management Gateway (TMG) and its end of life. The question was what would be my recommendations for replacing it. My first glib thought was “quickly” but I bit my tongue and went on with a better formed recommendation along the same lines.read more