DDoS

Botnets: DDoS and Beyond

Traditionally, DDoS is an avenue of profit for botherders. But today's botnets have evolved to include several attack vectors other than DDoS that are more profitable. And just as any business-oriented person would do, attackers follow the money.

Why Hybrid Always-On Protection Is Your Best Bet

Users today want more. The ubiquity and convenience of online competition means that customers want everything better, faster, and cheaper. One key component of the user experience is service availability. Customers expect applications and online services to be constantly available and responsive.

5 Key Considerations in Choosing a DDoS Mitigation Network

A DDoS mitigation service is more than just the technology or the service guarantees. The quality and resilience of the underlying network is a critical component...

Does Size Matter? Capacity Considerations When Selecting a DDoS Mitigation Service

Internet pipes have gotten fatter in the last decade. We have gone from expensive 1 Mbps links to 1 Gbps links, which...

Is It Legal to Evaluate a DDoS Mitigation Service?

A couple of months ago, I was on a call with a company that was in the process of evaluating DDoS mitigation...

DDoS Protection Requires Looking Both Ways

Service availability is a key component of the user experience. Customers expect services to be constantly available and fast-responding, and any downtime can result...

What Do Banks and Cybersecurity Have in Common? Everything.

New cyber-security threats require new solutions. New solutions require a project to implement them. The problems and solutions seem infinite while budgets remain bounded. Therefore,...

Top 3 Cyberattacks Targeting Proxy Servers

Today, many organizations are now realizing that DDoS defense is critical to maintaining an exceptional customer experience. Why? Because nothing diminishes load times or impacts...

2018 In Review: Memcache and Drupalgeddon

Attackers don't just utilize old, unpatched vulnerabilities, they also exploit recent disclosures at impressive rates. This year we witnessed two worldwide events that highlight...

What Can We Learn About Cybersecurity from the Challenger Disaster? Everything.

Understanding the potential threats that your organization faces is an essential part of risk management in modern times. It involves forecasting and evaluating all...

Disaster Recovery: Data Center or Host Infrastructure Reroute

Companies, even large ones, haven’t considered disaster recovery plans outside of their primary cloud providers own infrastructure as regularly as they should. In March...

Protecting Sensitive Data: A Black Swan Never Truly Sits Still

The black swan - a rare and unpredictable event notorious for its ability to completely change the tides of a situation. For cybersecurity, these...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.

Agile Security Is Now A Reality

Businesses are looking to optimize and accelerate their SDLC, in order to improve their operational efficiency and gain a competitive edge.

New DemonBot Discovered

Are you using Hadoop for data analytics? If so, know that a new bot is targeting Hadoop clusters with the intention of performing DDoS...

IDBA: A Patented Bot Detection Technology

Over half of all internet traffic is generated by bots — some legitimate, some malicious. Competitors and adversaries alike deploy “bad” bots that leverage different methods to achieve nefarious objectives. This includes account takeover, scraping data, denying available inventory and launching denial-of-service attacks with the intent of stealing data or causing service disruptions.