How Friday’s Massive DDoS Attack on the U.S. Happened On the morning of October 21st Dyn began to suffer from a denial of service attack (DoS attack) that interrupted… Daniel Smith | October 23, 2016
Automated Attacks Are Here to Stay It seems the future is upon us. Some of you may have heard about the attacks on Brian Krebs’ security… Dennis Usle | October 18, 2016
Are you ready for the new age of attacks? The unprecedented attacks launched recently against Brian Krebs’ blog (Krebs on Security) and the hosting provider OVH highlight the immense… Ben Desjardins | October 13, 2016
The Economics of Cyber Attacks In the late 1800s, a gentleman named Charles Duryea had an idea. While attending the Ohio state fair in 1886,… Ron Winward | October 5, 2016
Public Education Around Cyber Security Australia’s Prime Minister Malcolm Turnbull recently raised the issue of cyber security education during a Washington D.C. speech. The intention behind such… Paul Coates | September 28, 2016
5 Recipes For How to Design a Resilient Cyber-Attack Environment 1. Focus on availability-security Latency is a high focus for these folks. Most just focus on confidentiality and integrity-based security… Carl Herberger | September 27, 2016
Ask Yourself: Do I Need an Emergency Response Plan? WHY? Like the old words of wisdom “______ happens” (or simply, incidents occur), this is a fact of life. There are… Ben Zilberman | September 21, 2016
What are the implications of the crackdown on popular DDoSaaS site VDoS? The alleged creators of the popular VDoS website were arrested by Israeli authorities at the behest of the FBI on… Carl Herberger | September 16, 2016
Security Threats Are Like a Box of Chocolates You never know what you are going to get when you take something from a box of chocolates. I can… Frank Yue | September 14, 2016
As Cyber Security Programs Lose Their Moorings to Ransom-DoS: Radware Introduces the Ultimate Guide to Cyber Ransom The Growing Threat of Ransomware and RDoS—and What to Do About It Welcome to the world of cyber ransom—one of… Carl Herberger | September 14, 2016
Hybrid mitigation – Why it’s exactly what you need in complex attacks Recently a company in the DDoS protection space published an article about how hybrid mitigation models are ineffective against large… Ron Winward | August 31, 2016
Here are the specific ways the 2016 Republican National Convention (RNC) and Democratic National Convention (DNC) will be Cyber-Attacked Major Attack Type: Denial of Service Attacks Denial of Service (DoS) attacks have grown each and every year since 2010.… Carl Herberger | June 2, 2016