DDoS AttacksSecurity

Moving to Mobile – The Changing Face of DDoS

September 18, 2013 — by Jon Garside4

Like any data communication network, mobile networks contain a range of security threats. Though some threats are easy to identify and mitigate, the unique structure and complexity of mobile networks makes security threats elusive. In the past, mobile networks enjoyed the privileges of a “Walled Garden” – a closed, isolated ecosystem – under the full control of mobile carriers that used proprietary protocols and had minimal security risks due to restricted user access. They developed their own technologies, standards and interface systems, and were rewarded with security through carefully constructed obscurity. With the introduction of 4G, Long Term Evolution (LTE) and the IEEE standardization of mobile networks, the secure “Walled Garden” days are over.

Attack MitigationDDoS AttacksHTTP Flood AttacksSecurity

A Look Back at Black Hat: Staying True to its Roots, But Never the Same without Barnaby Jack

August 9, 2013 — by Jon Garside0

Black Hat has come and gone again, the swag has been dispersed, the livers are recovering and delegates are returning to their normal lives with new ideas and newfound fears. My colleagues will be reporting on their findings, but I wanted to just touch on a few highlights of the conference, some sadness and talk about the value of research.