A couple of years ago the discussion of SDN focused primarily on the fact that SDN separated the network control function from the network forwarding function and that separation of functions might require the introduction of new protocols such as OpenFlow. More recently there has been a lot of discussion about the value of an overlay SDN model vs. an underlay SDN model and the role of specialized hardware in either model. All of these discussions are important and they all are focused on key architectural characteristics of SDN.read more
David Monahan is Research Director for Enterprise Management Associates (EMA) and is a featured guest blogger.
There are numerous types of DDoS protection for your business. I’d like to expand on that topic and discuss how organizations are affected by non-volumetric DDoS attacks and what they can do to recover.read more
Secure Sockets Layer (SSL) and Transport Layer Security (TLS) sites are used today to secure transactions on banking sites, health care portals, and enterprise network and application portals. The use of these sites on the Internet has been increasing in past years and the volume of this type of traffic continues to grow, feeding speculation that perhaps one day these secure sites could replace clear-text HTTP.read more
Meet Radware’s New Commercial-Grade Attack Mitigation Platform – Built to Defeat the Largest Cyberattacks
Modern cyberattacks are sophisticated and are often launched over long periods of time. The complexity of these attack campaigns can result in attack detection and mitigation algorithms becoming less effective. This in turn, can create an increased need for talent and staffing as well as drive large processing needs for service providers and large enterprises.read more
In previous articles, we’ve reviewed content delivery networks (CDNs) from a variety of security perspectives – from how hackers have used them as weapons of DDoS to how bad actors can use free services to create astronomical billing issues. CDNs are often used as a mask, to levy API abuse and web reflector attacks that plague the Internet via bots and scrapers. Today, it is estimated that 65% of the traffic on the Internet is from such abuse. If you were to reflect on that idea, would you think that a CDN can protect you? That is the falsehood that is often believed.read more