Over the past twelve months, our team of authors has offered advice, expertise, and analysis on a variety of topics facing the application delivery and security communities. The articles below are the most read and shared ones we published this year. Our goal was (and is) to share our experience and knowledge so you, our readers, can better prepare, implement, and gain insights that you can apply to your business.
In addition to our own research, we learn from you, and we sincerely value the feedback and encouragement you share with us. So we want to extend a very special thank you to our readers, customers, and partners for another great year and best wishes for a smart, successful and secure 2016!
Based on your feedback, here are our most popular blogs from 2015:
What Do You Know About DDoS Attacks? Here’s the Ultimate Guide
The DDoS Handbook is built from the experience of more than ten years of battling DDoS attacks and protecting some of the largest, most network dependent, and most targeted organization in the world. Gain exceptional foundational knowledge on cyber-attack detection, motivation, and mitigation.
The 10 Immutable Laws of Personal Security on the Internet
Understanding security principles can be more powerful than understanding individual security elements. These ten thoughts on consumer-level security can help to sharpen your “security saw” and guide you to make better decisions on the Internet.
The Internet has Upgraded to HTTP/2, but One Key Feature Will Slow You Down
HTTP/2 incorporates a lot of features to improve the performance and content delivery of your site. However, a key feature of this upgrade is encryption – which can slow down web surfing. Learn how transitional services like gateways can deliver the enhanced services of promised by the new Internet.
PortMapper is Preying on Misconfigured Servers to Amplify Attacks
What is PortMapper and are you vulnerable? Learn how this UDP-based reflection cyber-attack is being used to spoof IP addresses, increase packet size and overwhelm servers.
Do You Still Need Optimization After Migrating to HTTP/2?
The short answer – Yes. There are important front end optimization techniques that come on top of the new HTTP/2 protocol that can provide significantly more acceleration potential to your applications. The best tools + the best practices = the best outcome for your web performance.
Don’t Let Headlines Cloud Your Security Architecture Decisions
Cloud-based resources should play an important part in any sound cyber-attack protection strategy. But those believing that this is the only option, can leave themselves exposed to threats and risks that take advantage of the limitations of cloud-only protection.
REPORT: State of the Union for Ecommerce Page Speed & Web Performance (Summer 2015)
Top ecommerce sites often place page speed at a lower priority than content and visual appeal. We took a no-nonsense look at the ecommerce sites that users visit most to ask the question: Is today’s ecommerce experience matching the expectations of today’s users?
DDoS Attack Myth: Larger Cyber-Attacks Do More Damage
Very large DDoS Attacks (>50Gbps), while headline gabbers, represent a tiny portion of the overall attack landscape. Smaller attacks are often just as, if not even more, harmful. Learn what you should really be asking about when you are looking to protect your network.
** What would you like to read more about in 2016? **
Let us know in the comment section or reach out to us at firstname.lastname@example.org