Advancements are continually being made to defend organizations from cyber-attacks. I wanted to take some time to share some powerful reminders of how diligence in approach is needed.
Organizations that used to rely on their service provider’s DDoS protection service (in-the-cloud) found that the attacks that hit their business could and would bypass the provider’s protection layer. This is because DDoS is a tactic, not the overall problem. Attacks borne from the Internet are the problem and solutions designed to handle a simple tactic, wind up falling short.read more
Cybercrime and hacktivism are on the rise and commercial and governmental organizations are common attack targets. But, based on recent evidence, an increasing number of cyber-attack targets are other attackers. That’s right – attackers attacking other attackers.read more
Recently, I had the good fortune to be invited to present the keynote speech at the 2014 Les Assises Security Conference held in the beautiful city state of Monaco. Les Assises is the largest information-security gathering in France and year-in and year-out it proves to be not only a huge information sharing opportunity, but also a time of self-reflection and strategy affirmation for the thousands of security executives that attend.read more
Last week, I was invited to speak at the 16th annual AT&T Cyber Security Conference in NYC where over the span of two days, speakers kept the audience immersed with engaging topics. Surrounded by security executives, I learned that we all share similar concerns. There were resounding messages that resonated with me that I’d like to share as my key takeaways from the event.read more
Denial of Service (DoS) has reigned as the most headline-grabbing network attack over the past three years. However, the truth is that attacks come in all different flavors ranging from Distributed DoS (DDoS) to low-volume application-layer attacks that target user credentials, financial information, trade secrets, or abuse of services to commit fraud. At the application layer we most often think of HTTP, however, there are almost an immeasurable number of Layer 7 applications available for exploit.read more