This post is also available in: Inglese Francese Tedesco Portoghese, Brasile Spagnolo Russo

Pascal Geenens

As the Director, Threat Intelligence for Radware, Pascal helps execute the company's thought leadership on today’s security threat landscape. Pascal brings over two decades of experience in many aspects of Information Technology and holds a degree in Civil Engineering from the Free University of Brussels. As part of the Radware Security Research team Pascal develops and maintains the IoT honeypots and actively researches IoT malware. Pascal discovered and reported on BrickerBot, did extensive research on Hajime and follows closely new developments of threats in the IoT space and the applications of AI in cyber security and hacking. Prior to Radware, Pascal was a consulting engineer for Juniper working with the largest EMEA cloud and service providers on their SDN/NFV and data center automation strategies. As an independent consultant, Pascal got skilled in several programming languages and designed industrial sensor networks, automated and developed PLC systems, and lead security infrastructure and software auditing projects. At the start of his career, he was a support engineer for IBM's Parallel System Support Program on AIX and a regular teacher and presenter at global IBM conferences on the topics of AIX kernel development and Perl scripting.

Cosa guida gli attacchi DDoS e perché dovrebbe preoccuparti

DDoS sta per attacchi Distributed Denial of Service. Lasciamo da parte per ora il termine Distributed in quanto riferito principalmente alla tecnica e concentriamoci in primo luogo sull’espressione Denial of Service. Come indicato dal termine, l'obiettivo di un attacco DoS è quello di interrompere o negare i servizi agli utenti legittimi.

Ransomware e Ransom DoS, perché sono simili ma diversi

Per quanto ransomware e ransom DoS abbiano un obiettivo comune e alcune delle loro tattiche si sovrappongano, le loro tecniche e il tasso di successo sono piuttosto diversi, così come la minaccia e il potenziale impatto per le aziende. Nel corso del tempo, con l'evoluzione di entrambe le minacce la loro reputazione e le loro tecniche si sono incrociate.