Cyber Monday Survival Tips for eRetailers: Ensuring Network and Application Availability and Guaranteeing High QoE
With Thanksgiving right around the corner, businesses everywhere are readying themselves for the post-holiday shopping blitz. And with the National Retail Federation predicting that sales will increase by 2.8 percent this holiday season, Cyber Monday promises to be lucrative for retailers that are prepared.
In anticipation of Cyber Monday, online retailers need to assure that tools are in place to minimize downtime when web traffic spikes, and that applications are available as customers make purchases from their mobile devices.read more
Managing the security of critical information has proven a challenge for businesses and organizations of all sizes. Even companies that invest in the latest security infrastructure and tools soon discover that these technology-based “solutions” are short-lived. From antivirus software to firewalls and intrusion detection and prevention systems, these solutions are, in fact, merely the most effective strategies at the time of implementation. In other words, as soon as businesses build or strengthen a protective barrier, the “bad guys” find another way to get in.read more
I recently returned from the Open Networking Summit (ONS), which took place at Stanford University on October 17-19th. It’s clear from the conference that the networking industry is on the verge of a major transition. And leading that change is OpenFlow (or as it has come to be defined in the industry: SDN – Software Defined Networks), which was the star of the summit.read more
So far this year has been astonishing for the “Named Attacks” by Hacktivists as illustrated in the chart below. In addition to these named attacks there are two additional attacks which are scheduled to take place over the coming days, one against FoxNews.com and the other against Facebook.com (although the latter has been renounced by the ‘main faction’ of Anonymous).read more
Attacks and countermeasures typically focus on techniques, vulnerabilities, systems and tools. There is another angle of the cat-and-mouse fight between attackers and victims — the economical aspect of this cyber war.read more