Recent Articles

Stop Bots From Taking a Bite Out of Your Marketing Spend

Marketing fraud is a growing problem for online businesses in every industry.

The Growing Threat of Payment Fraud for Online Retailers

The best way to stop payment fraud is to stop cyber criminals right at the outset ─ as soon as they visit your site.

Retailers, How Much of Your Holiday Traffic is Actually Human?

In order to better predict bot behavior for the 2019 holiday season, we analyzed the 2018 November-December bot data from our network. Here's what we found.

Why Organizations are Failing to Deal With Rising Bot Attacks

Despite serious threats, businesses aren't adopting bot management solutions; they are instead using in-house resources, putting user security at risk.

How to Recover from a DDoS Attack

Recovering from a DDoS attack is no simple matter, but once an attack is over, it is time to assess the impact, evaluate your defenses, and better prepare for the next incident.

5G & IoT: Real-World Rollouts Launch New Opportunities and Security Threats

This e-book examines what service providers need to know as commercial rollouts of 5G technology begins in 2020.

IoT Security: ROI Model Guide

This report provides a detailed overview of a modeling tool designed to quantify the financial and ROI fundamentals of IoT security services.

TCP Reflection Attacks: Then and Now

Expect to see TCP amplification used in parallel with UDP amplification as part of a multi-vector campaign designed to defeat mitigation defenses.

Edge Computing, 5G & IoT: Risks and Opportunities for Service Providers

Edge computing environments, the deployment of 5G networks and the mass adoption of IoT devices have placed new cybersecurity demands on service providers.

Most Popular

Layer 7 Attack Mitigation

The DDoS world hits new records lately, with the attacks on KrebsOnSecurity.com and later on OVH and Dyn reached a bandwidth of more than 1T of traffic. While the bandwidth numbers are impressive indeed, the numbers themselves were expected. The DDoS security experts expect...

Excessive Permissions are Your #1 Cloud Threat

Migrating workloads to public cloud environment opens up organizations to a slate of new, cloud-native attack vectors which did not exist in the world of premise-based data centers. In this new environment, workload security is defined by which users have access to your cloud...

GDPR and HITECH: Can the past predict the future?

In February of 2017, Memorial Healthcare System settled their HIPAA violation fines for $5.5 Million USD. During an investigation, it was discovered that over 100,000 patient records had been impermissibly accessed. Allegedly, an ex-employee retained access to personal identifying information and sold data records...

Recommended

The State of Web Application Security 2019

This report details current perceptions about the state of application attacks, security practices and the impact of the transition to microservice architectures.