Recent Articles

Seven L7 DDoS Attacks to Watch Out For

As more and more services are migrating online, DDoS attacks are increasingly shifting away from the network layer, and into the application layer.

Work From Home Was The Sprint, Now Comes The Security Marathon

The decisions & tools that organizations choose now, and the training they provide to their employees, will have enduring effects on security.

Cracking Passwords and Taking Over User Accounts

The right bot manager can help block illegal account access before fraudulent transactions can occur, as well as sophisticated account takeover attacks.

Hybrid Warfare: How Cancel Culture Can Fuel a War

Countries in conflict are starting rely on a hybrid variation of tactics and techniques, including cyber activity and information/influential campaigns.

Designing DDoS Mitigation Solutions for Simplicity & Speed

Given the key aspect of DDoS mitigation is accurate detection & fast mitigation, over designing the solution can create confusion when you're under attack.

Why You Should Reconsider DDoS Mitigation from Public Cloud Providers

When you opt for your provider’s DDoS mitigation service, you're protected against common attacks, but more sophisticated attack vectors will go undetected.

There’s No Silver Bullet to Deal with Cyberattacks

Countries that are slow to digitally transform and have a smaller threat landscape have avoided major events, although they now face a tough situation.

Did My Cloud Migration Really Cost That Much!?

As organizations embark on a cloud journey, they must compare competing pricing models & take advantage of cloud providers' discounting mechanisms.

Implementing Automated Security Services: We’re Somewhat Confident Virtually Here

There continues to be a sharp focus on deploying 5G core (5GC) networks, which also brings a myriad of security considerations to the forefront.

Most Popular

Layer 7 Attack Mitigation

The DDoS world hits new records lately, with the attacks on KrebsOnSecurity.com and later on OVH and Dyn reached a bandwidth of more than 1T of traffic. While the bandwidth numbers are impressive indeed, the numbers themselves were expected. The DDoS security experts expect...

Excessive Permissions are Your #1 Cloud Threat

Migrating workloads to public cloud environment opens up organizations to a slate of new, cloud-native attack vectors which did not exist in the world of premise-based data centers. In this new environment, workload security is defined by which users have access to your cloud...

GDPR and HITECH: Can the past predict the future?

In February of 2017, Memorial Healthcare System settled their HIPAA violation fines for $5.5 Million USD. During an investigation, it was discovered that over 100,000 patient records had been impermissibly accessed. Allegedly, an ex-employee retained access to personal identifying information and sold data records...

Recommended

The State of Web Application Security 2019

This report details current perceptions about the state of application attacks, security practices and the impact of the transition to microservice architectures.