Attack Types & VectorsSecuritySSL

Sustained Vigilance Key for Financial Services Organizations in Light of Stable, Steady Threat Landscape

April 7, 2016 — by Ben Desjardins0


Every year when we publish our Global Application & Network Security Report, one of the most popular aspects of the report is what we call our “Ring of Fire.”

The Ring of Fire presents a graphical representation of evolving and relative risk from cyber security threats across some of the most commonly targeted industries.

Attack Types & VectorsDDoSSecuritySSL

The Stages of Online Business Transformation Come With Benefits… and Risks

March 31, 2016 — by Ben Desjardins0


As a father of teenaged children, I sometime marvel at the level of network-connectedness of that younger generation. It is fair to say that for these and future generations, it will be next-to-impossible to be a productive member of society without surrendering to the myriad social media applications and other online platforms.

Our transformation to a fully-connected society is similar in many ways to the transformation business has gone through over the past 15-20 years, ultimately leading to a state where no business can exist today without having at least started down the path of becoming an online business.

Cloud SecuritySecurity

Themes, Conversations and Takeaways from 2016 RSA

March 10, 2016 — by Ben Desjardins0


The hackers are winning.

Or said more accurately, strong security is losing . . . sometimes to itself.  

That seemed to be a general undertone of last weeks’ RSA Conference. No one actually came out and said it in those words, but there is an undeniable degree of humility to many of the messages passing through the halls of the Mascone Center this year.

Attack Types & VectorsSecuritySSL

When Trends Collide – Ransomware and IoT Attacks Continue

March 8, 2016 — by Ben Desjardins0


A highlight of the annual Global Network & Application Security Report is always the deep case studies. Each year, we work closely with a customer that has made the difficult, but admirable decision to shine a light on their experiences as a victim of a cyber-security attack.  By sharing, these customers can help others prepare for what now is sadly an inevitable experience for many companies.

Attack Types & VectorsCloud SecurityDDoSSecuritySSL

Cyber-Attackers Are Adjusting to the Security Adjustments You’ve Made

February 16, 2016 — by Ben Desjardins0


Sometimes it feels terrible to be right. In our recent Global Application & Network Security Report we predicted an increase in complex encrypted attack vectors and the importance of putting in place adequate defenses that can scale and inspect encrypted traffic.  Just last week, we got a vivid example of the increasing threat posed by encrypted attack vectors. A high profile attack occurred with an organization that had both a combination of on-premises and cloud-based DDoS protection, yet the organization’s site still went down, in large part because the attack “hid” from detection by the cloud-based resources by using encryption.

Attack Types & VectorsDDoSSecuritySSL

SSL Breaks Bad: A Protective Technology Turned Attack Vector

December 10, 2015 — by Ben Desjardins1

It’s an unfortunate reality that things meant to do good can and do get misused for harm.

Consider the myriad stories around criminals using Google maps street view as a way to “case” a target, or how 3D printers are being used to produce unregistered guns. The use of technology being for good or for evil in reality has as much to do with the perspective of the user than anything else.


How OnlineTech Stayed Ahead of the Cyber-Threat Curve

November 13, 2015 — by Ben Desjardins0

I live relatively close to Ashburn, Virginia, which you may know is a major exchange point for the Internet. Our area has gone through phases of development over the past 15-20 years that I’ve lived in there, starting with an explosion of residential development (which we can thank in large part for our notoriously bad traffic). But more recently I’ve noticed a shift in the development and construction within the region. Rarely does a week pass now where I don’t notice a new area being cleared for significant construction.


DDoS Attack Myth: Larger Cyber-Attacks Do More Damage

November 11, 2015 — by Ben Desjardins0

“I just want to know that I’m safe from these 100Gbps plus attacks.”

These are the words heard (or at least the sentiment expressed) over and over for those of us helping defend the front lines from Distributed Denial of Service (DDoS) attacks. What may come as a surprise is that for some service providers in the space, this perspective causes more concern than glee. Sure, it is fair to say it’s not all bad to encounter prospects with this level of urgency. But the reality is that statements like this are a sign pointing to a long educational process for the buyer more so than a quick sale and long-term happy customer.

Application SecuritySecurity

Consumers’ Insatiable APP-etites Slowed, but Not Stopped by Security

October 29, 2015 — by Ben Desjardins0

The other day I was making my way through the airport and stopped at a restaurant for a quick bite to eat. I took a seat at the bar, and the bartender pointed out the tablet waiting for me from which I could view the menu and order my lunch.

So this is what we’ve come to… an obsession with digitizing every interaction to the point where I use an app to communicate to the person five feet in front of me? While perhaps a somewhat extreme and silly (though 100% true) example, we are clearly on a path of living and interacting increasingly through apps.