My Takeaways from This Year’s AT&T Cyber Security Conference

Last week, I was invited to speak at the 16th annual AT&T Cyber Security Conference in NYC where over the span of two days, speakers kept the audience immersed with engaging topics.  Surrounded by security executives, I learned that we all share similar concerns.  There were resounding messages that resonated with me that I’d like to share as my key takeaways from the event.

read more

Beyond Free Calls — Protecting Your Business from Phone System Fraud

Denial of Service (DoS) has reigned as the most headline-grabbing network attack over the past three years.  However, the truth is that attacks come in all different flavors ranging from Distributed DoS (DDoS) to low-volume application-layer attacks that target user credentials, financial information, trade secrets, or abuse of services to commit fraud.  At the application layer we most often think of HTTP, however, there are almost an immeasurable number of Layer 7 applications available for exploit.

read more

Every Political Action Causes a Cyber Reaction

Just as Newton’s Third Law of motion states “for every action, there is an equal and opposite reaction” a similar notion can be applied to the recent news of financial organizations being hacked.

read more

A Mid-Year Recap: 2014 Network Security Predictions We Saw Coming

Several months ago, following an in-depth analysis of attack methods and defense techniques, the Radware Emergency Response Team (ERT), developed a set of network security predictions that the industry could face this coming year. Let’s take a look at their forecast and see where we stand now.

read more

6 Types of DDoS Protection for Your Business

David Monahan is Research Director for Enterprise Management Associates (EMA) and is a featured guest blogger.

DDoS attacks have become commonplace these days.  The offending attackers may be hacktivists, cyber-criminals, and nation states or just about anyone else with an Internet grudge and a PayPal or Bitcoin account.  These attacks themselves often require no technical skill.  Someone with a bone to pick can simply purchase the use of any number of nodes on one or more botnets for an hourly fee (long term rate discounts available); use a Graphical User Interface (GUI) to organize the attack and then launch it.

read more

Cyber Attacks on Oil and Gas

A few weeks ago, news agencies shared reports on the Energetic Bear attack. This cyber-attack, or rather virus, was reportedly introduced by a Russian hacking group and it targeted oil, gas, power, and energy investment companies. The threatening malware had the ability to shut down major power grids, oil pipelines, gas, and energy traders. Analysts speculate that the attack motive was to gain competitive advantage in state-sponsored espionage against global oil and energy producers.

read more