Optimizing network performance is a task that spans multiple domains – from architecting the network, with capacity and topology (segmentation) considerations, through redundancy, bandwidth management and security aspects. But today, I would like to raise 5 additional ways to optimize overall network performance by best utilizing advanced Application Delivery Controller (ADC) capabilities for front end applications.read more
It’s an unfortunate reality that things meant to do good can and do get misused for harm.
Consider the myriad stories around criminals using Google maps street view as a way to “case” a target, or how 3D printers are being used to produce unregistered guns. The use of technology being for good or for evil in reality has as much to do with the perspective of the user than anything else.read more
2015 was a paramount year in data exfiltration. You may be familiar with many of the data breaches that were covered in the media this year, including the United States IRS, several major health care providers, Ashley Madison, and most recently, the personal data of children and parents from the vTech breach. Just last week, retailer Target agreed to settle with several banks for $39 million over their 2013 data breach.read more
When I hear IT people use the term hybrid, I recall my background and education in biology. In the biology community, hybrid usually refers to the result from a combination of two different species or subspecies. For example, a zonkey is a cross between a zebra and a donkey. More recently, hybrids have also been associated with the controversial practice of genetically modified crops where genes from completely different organisms are spliced into a plant to provide an otherwise unavailable benefit. Some strains of corn have had a gene added to improve their resistance to popular herbicides.read more
DDoS Attacks have become a mainstream topic frequently in the news with coverage in major news outlets around the globe from ABC News to ZDNet and most in between. Attack campaigns by groups like Anonymous, DD4BC, Lizard Squad and Lulzsec have become dinner conversations in many homes and online businesses have been struggling to keep pace with the evolving threat landscape.read more
Whether you are an enterprise, e-commerce business, local organization, or government office – it’s merely a matter of time before you’re going to have to deal with a cyber-attack.
The question is what can you do before an attack to have adequate defenses in place? Evaluating and selecting the best cyber-attack mitigation solution and vendor for your needs is a good place to start. And like any business initiative, good preparation and planning can go a long way toward making the process as manageable, painless, and inexpensive as possible.read more
I own a car and drive it regularly. I keep it maintained according to a schedule and make sure it is running well. To ensure that vehicles are running properly, auto manufacturers introduced the on board diagnostics (OBD) standard. Since 1996, the OBD-II standard has been required on all vehicles in the United States and Europe has the EOBD equivalent.read more
Can Your Firewall and IPS Block DDoS Attacks? This question is something we hear often at Radware. The concern surrounds the uncertainty that stateful devices (firewalls, IDS/IPS, and load balancers) could become the fault point in a network when it is under attack. According to our research of different attacks analyzed over the last year, approximately one third of the failures in attacks were attributed to stateful devices being placed in front of a web-facing resource. In other words, the devices that we deploy in the datacenter to maintain our uptime are sometimes the specific reason that networks fail when they come under attack.read more