During the past year, we have become numb to the sheer outrage of cyber-attacks and the devastating impacts they have left in our wake. In fact, I still hear today an incredible amount of dismissive words to ascribe the attacks as “nuances” or “disturbances,” which is clearly anything but the case for the organizations that are battling the attacks and tallying the financial losses of such events.read more
This past weekend, Security Week ran a byline I wrote regarding Long Term Evolution (LTE).
Although this brings the promise of relieving traffic jams for mobile operators, it also brings new security risks. As traffic generated by smartphones grow, LTE networks’ fast mobile broadband will assist handling the increased traffic.
However, mobile operators will have to learn how to handle the new threats. New Advanced Persistent Threats (APT) are emerging and mobile carriers and mobile user will find themselves struggling with similar APTs that we see at Enterprises today. For Long Term Evolution networks not to fall short on security, mobile operators must realize the increased threats from malware, fraud, distributed denial of service (DDoS) attacks and many other attacks, and adopt more comprehensive and innovative security strategies.
Although LTE, which is commonly referred as mobile network 4th generation (4G), provides a solid infrastructure to deliver advanced, content-rich applications in real-time, I discuss a few security challenges that should be addressed in order to protect the network from overload and declining quality of service.
The article can be found here. I invite you to read it, and feel free to share any comments or questions you may have for me.read more
The inventor of the telephone, Alexander Graham Bell once stated, "Before anything else, preparation is the key to success." Unfortunately, it appears that attackers launching DoS/DDoS attacks have embraced this line of thought and invested their efforts in reconnaissance and meticulous preparation during the "pre-attack" phase. Drawing from attacks handled by our Emergency Response Team (ERT), Radware recently conducted research on the ways in which pre-attack planning and detailed preparation dramatically increases the potency and success rate of attacks.read more
Today, we launched our 2012 Global Application and Network Security report. It was prepared by our security experts – the Emergency Response Team (ERT) – who’ve seen their fair share of cyber attacks while actively monitoring and mitigating attacks in real-time. In this year’s annual report, our experts have uncovered several new trends in cyber-security worthy of a closer look.read more
As a former military veteran, I fully understand that the term “weekend warriors” is typically used to refer to military personnel on reserve status. These folks are normally tasked with some routine activities throughout the year with their affiliated military ‘unit,’ which is generally fulfilled during a weekend or two as not to disrupt their ‘day’ jobs.
However, have you noticed how similar a private cyber warrior is to a military cyber warrior? In suggesting this, I’m not trying to take anything away from my military brethren. But the duties, tasks and efforts are eerily similar. The nature and persistency of modern day cyber-attacks has forged a new type of information security professional – someone who needs to sacrifice nights, weekends, sleep and a personal life to answer the call of cyber defense duty. Sounds a lot like what I knew when I was in the military.read more