A disreputable person enters a bank and walks up to the teller and presents a note asking for the teller to give them all the money. The well trained teller, sets off an alarm, scaring the would-be thief and he runs out of the bank. The budding criminal walks to another branch of the same bank. He walks in and attempts to do the same thing. As long as he is able to avoid the pursuit, the felon-in-training can repeat this process until he is successful. The future outlaw might even make some adjustments before his next attempt to increase his chance of success.read more
It’s very difficult to deliver a commitment level of an application service without a Service Level Agreement (SLA). And it’s impossible to manage an application’s SLA without first gaining visibility into it. Solutions for monitoring application performance and SLA has long been considered a costly and complex task which required inserting hardware probes and/or integrating software agents into every application server.read more
A remote hack-attack on Chrysler Jeeps dominated headlines this past summer when researchers used an exploit to wirelessly control parts of a car’s systems. Initially, they took over the air conditioning, the windshield wipers and the radio. Intrigue grew to concern, however, when those same researchers showed how they could also slow down the car on the highway without any chance for the driver to maintain control. Those revelations led to the first known product recall on a networked car: The Jeep Manufacturer Fiat Chrysler had to update software in more than 1.4 million of its vehicles.read more
The genealogy of the current application delivery controller (ADC) technology is an interesting one that has its roots based on delivering scalability and availability through server load balancing (SLB). Security was a side effect of this function. The ADC has evolved to become an integral component within network security architectures.read more
In the constantly evolving threat landscape attackers are always finding new ways to target their victims. In the last few years we have seen a steady growth in Distributed Reflective Denial of Service attacks, DrDoS. These attacks rely on misconfigured public servers and these public servers can provide an attacker with the amplification in bandwidth needed to take down their targeted site.read more
The headline-making cyber-attack on the German Bundestag lower house of Parliament was recently solved. Reports state that attackers stole unknown amounts of data and government officials are now being forced to spend millions of euros on the cleanup to fix their entire computer system.
The attack (one of the biggest known against the German Government’s IT systems) first became public in May 2015 and while more background information has recently become available, understandably, even this available information is being handled with care.read more
There’s a lot of talk about HTTP/2. Why? Possibly because it promises to help alleviate some of the bottlenecks that come along with the dynamic, rich webpages that people have come to expect.
The consumer market is driven by media consumption, be it high-definition videos, third-party plugins or animations, and these are bandwidth-hungry elements in an adversarial relationship with page load speeds.read more
The attacks that get the most news coverage have dramatic names that make for compelling headlines. You can practically feel the intensity of brute force or volumetric DDoS attacks. These attacks target layers 1-4 of operator networks, the layers where data is moved around in the network. But, there’s a troubling blind spot in legacy network security solutions that enables hackers to go deeper into the operators network – all the way through to Layer 7, the application layer.read more