Recent Articles

How to Prepare for Cyber Threats Targeting the Olympics

While connectivity provides a better user experience, additional technology and innovation can create a larger attack surface for cybercriminals.

Coronavirus: Its Four Most Prevalent Cyber Threats

The attack surface is changing & expanding as many organizations move to online and digital experiences in an effort to inhibit the spread of COVID-19.

Expected Technology at the 2020 Olympics in Tokyo

While technology & connected venues are a great achievement, they also create a larger threat landscape that becomes increasingly difficult to defend.

5 Myths About DDoS in 2020

The nature of DDoS attacks is shifting, and while some organizations might believe that DDoS is a thing of the past, this is not the case. Here are the top 5 DDoS myths for 2020.

Striking the Right Balance: How ADCs Make SDDCs Better

By implementing an ADC with proper the functionality & integration points, IT organizations can strike the balance between resources, agility & scalability.

The Global Impact of COVID-19 on Markets & the Digital Experience

Coronavirus outbreaks are changing the economy, creating disruption across industries.

Service Providers Keep Pace In Today’s Digitally Charged World

Service providers are moving away from core networking to edge computing, and service platforms are now multi-cloud, creating more complexity.

Nation State Attacks Are on the Rise. Here’s Why You Should Be Worried.

In 2018, 19% of organizations believed they were attacked by a nation-state. That figure increased to 27% in 2019.

Hey! Where Are My Credits?

Security is paramount since there is a big financial element at stake in online gaming – for the companies that offer these games and for the players.

Most Popular

Layer 7 Attack Mitigation

The DDoS world hits new records lately, with the attacks on KrebsOnSecurity.com and later on OVH and Dyn reached a bandwidth of more than 1T of traffic. While the bandwidth numbers are impressive indeed, the numbers themselves were expected. The DDoS security experts expect...

Excessive Permissions are Your #1 Cloud Threat

Migrating workloads to public cloud environment opens up organizations to a slate of new, cloud-native attack vectors which did not exist in the world of premise-based data centers. In this new environment, workload security is defined by which users have access to your cloud...

GDPR and HITECH: Can the past predict the future?

In February of 2017, Memorial Healthcare System settled their HIPAA violation fines for $5.5 Million USD. During an investigation, it was discovered that over 100,000 patient records had been impermissibly accessed. Allegedly, an ex-employee retained access to personal identifying information and sold data records...

Recommended

The State of Web Application Security 2019

This report details current perceptions about the state of application attacks, security practices and the impact of the transition to microservice architectures.