Meet Radware’s New Commercial-Grade Attack Mitigation Platform – Built to Defeat the Largest Cyberattacks

Modern cyberattacks are sophisticated and are often launched over long periods of time.  The complexity of these attack campaigns can result in attack detection and mitigation algorithms becoming less effective.  This in turn, can create an increased need for talent and staffing as well as drive large processing needs for service providers and large enterprises.

read more

Can a CDN Stop Cyber-Attacks?

In previous articles, we’ve reviewed content delivery networks (CDNs) from a variety of security perspectives – from how hackers have used them as weapons of DDoS to how bad actors can use free services to create astronomical billing issues.  CDNs are often used as a mask, to levy API abuse and web reflector attacks that plague the Internet via bots and scrapers.  Today, it is estimated that 65% of the traffic on the Internet is from such abuse.  If you were to reflect on that idea, would you think that a CDN can protect you?  That is the falsehood that is often believed.

read more

Welcome To the Age of the Constant Attack

Time has a way of changing our perspective on things. New experiences and the evolution of everything around us can’t help but cause us to reconsider past ideas and outlooks. It is a truism of life that extends into many areas, including the way we look at IT.

read more

Stick or Carrot? Obama Calls for Public/Private Sector Cyber-Security Collaboration

Last Friday, President Obama continued his efforts of advancing cyber-security as a national priority. In a speech at Stanford University in the heart of Silicon Valley, the President emphasized the importance of collaboration between the public and private sectors to an audience of students, consumer-oriented companies, and representatives of the technology sector.

read more

How Mobile Operators Feel About Their Cyber Attack Risk

In the recent Light Reading webinar “Dealing with DDoS Application Threats in Mobile Networks,” Senior Heavy Reading Analyst Patrick Donegan and I discussed the increased frequency of application-based attacks in the mobile network. Leveraging Heavy Reading survey data and pointing to real examples, we sought to demonstrate just how vulnerable the network and mobile devices can become to DDoS attacks, especially as LTE scales.

read more

Is Your Home (Network) Haunted? The Threats of the Ghost Vulnerability and the IoT

Recent vulnerabilities have surfaced that have opened up interesting debates and spirited discussions regarding what I see as vulnerabilities in embedded Linux systems.  Devices that are considered part of the “Internet of Things” (IoT) have embedded Linux and this can make it fairly easy for hackers to compromise home networks.   

read more