Carl Herberger

84 POSTS1 COMMENTS
Carl is an IT security expert and responsible for Radware’s global security practice. With over a decade of experience, he began his career working at the Pentagon evaluating computer security events affecting daily Air Force operations. Carl also managed critical operational intelligence for computer network attack programs to aid the National Security Council and Secretary of the Air Force with policy and budgetary defense. Carl writes about network security strategy, trends, and implementation.

Navigating the Bot Ecosystem

Bots touch virtually every part of our digital lives -- and now account for over half of all web traffic.

It only takes 6,000 smart phones to take down our Public Emergency Response System?

There are fewer scenarios which illustrate an evildoer’s heart than those designed for mass carnage. We are all familiar with the false alarm (human mistake)...

2018: Snapshot of the Most Important Worldwide Cybersecurity Laws, Regulations, Directives and Standards

Are you out of breath from the breakneck pace of cyberattacks since the start of 2018? Throughout the world, nearly daily news reports have...

Federal CISO: Superhero Needed

A famous leadership coach said, “Only Superman can leap tall buildings in a single bound, the rest of us must chip away at our...

New Threat Landscape Gives Birth to New Way of Handling Cyber Security

With the growing online availability of attack tools and services, the pool of possible attacks is larger than ever. Let’s face it, getting ready...

IT Can Be a Creepy Clown: Five Things That Keep Me Up At Night

If you are a security professional like me, you probably wind up speaking passionately about an attack vector, a cyber-incident or trends in information...

What Does a Windstorm in Wyoming Have to Do with Cyber Security?

Natural disasters serve as excellent examples of the unforeseen consequences that a cyber-attack against infrastructure will have. Take for example a strong windstorm in...

Cyber Security Predictions

2016 was the Year of DDoS. 2017 was the Year of Ransom. Can we assess leading indicators of new attack techniques and motivations to...

Pandora’s Box: Auditing for DDoS Vulnerabilities, Part II

The Rise of the “Availability Vulnerabilities” Availability problems aren’t necessarily unique; however, the testing is certainly different. This “availability security problem” is resulting in an increased...

Pandora’s Box: Auditing for DDoS Vulnerabilities, Part I

THE BUSINESS PROBLEM: Your company has reason to believe that it may be attacked in the near future or recently has come under attack. The...