main

DDoSSecurity

Choosing the Right DDoS Solution – Part IV: Hybrid Protection

April 24, 2018 — by Eyal Arazi0

hybrid-solution-960x637.jpg

This is the last part of the blog series exploring the various alternatives for protection against DDoS attacks, and how to choose the optimal solution for you. The first part of this series covered premise-based hardware solutions, the second part discussed on-demand cloud solutions, and the third part covered always-on cloud solutions. This final piece will explore hybrid DDoS solutions, which combine both hardware and cloud-based components.

DDoSSecurity

Choosing the Right DDoS Solution – Part III: Always-On Cloud Service

April 4, 2018 — by Eyal Arazi0

always-on-cloud-960x598.jpg

This blog series dives into the different DDoS protection models, in order to help customers choose the optimal protection for their particular use-case. The first parts of this series covered premise-based appliances and on-demand cloud services. This installment will cover always-on cloud DDoS protection deployments, its advantages and drawbacks, and what use-cases are best for it. The final part of this series will focus on hybrid deployments, which combine premise-based and cloud-based protections.

DDoS AttacksSecurity

SIP Protection: What Your SIP Security Solution Should Have

April 3, 2018 — by Fabio Palozza0

sip-protection-960x591.jpg

SIP-enabled devices have gained widespread use in recent times. With more and more VoIP applications that use SIP as their signalling protocol being developed these days, the industry should put greater emphasis on safeguarding SIP assets against undesirable exploitations that may either degrade the quality of VoIP services or promote cyber-crime.

DDoSSecurity

Choosing the Right DDoS Solution – Part II: On-Demand Cloud Service

March 29, 2018 — by Eyal Arazi0

on-demand-cloud-960x640.jpg

This blog series explores the various options for DDoS protection and help organizations choose the optimal solution for themselves. The first part of this series covered the premise-based DDoS mitigation appliance. This installment will provide an overview of on-demand cloud-based solutions. Subsequent chapters will also cover always-on and hybrid solutions.

Attack Types & VectorsDDoS AttacksSecurity

Choosing the Right DDoS Solution – Part I: On-Prem Appliance

March 14, 2018 — by Eyal Arazi1

choosing-ddos-part-1-960x534.jpg

As DDoS attacks grow more frequent, more powerful, and more sophisticated, many organizations turn to DDoS mitigation providers to protect themselves against attacks.

However, DDoS protection is not a one-size-fits-all fixed menu; rather, it is an a-la-carte buffet of multiple choices. Each option has its unique advantages and drawbacks, and it is up to the customer to select the optimal solution that best fits their needs, threats, and budget.

This blog series explores the various options for DDoS protection deployments and discusses the considerations, advantages and drawbacks of each approach, and who it is usually best suited for.

DDoSSecurity

Cloud vs DDoS, the Seven Layers of Complexity

March 7, 2018 — by Jeff Curley0

cloud-vs-ddos-960x656.jpg

A question that I’ve encountered many times in the field of late is what are the impacts of DDoS attacks on cloud compute environments?  The primary benefit of cloud is that it elastically scales to meet variable demand, scale up instantly, scale down when demand subsides – in seconds…  So layman’s logic might say that cloud-based services are immune from the downtime effects of DDoS attackers, however the possibility of gigantic unexpected bills is a given?

Attack Types & VectorsBotnetsSecurity

DarkSky Botnet

February 8, 2018 — by Yuval Shapira1

darksky-botnet-960x600.jpg

Radware’s Threat Research has recently discovered a new botnet, dubbed DarkSky. DarkSky features several evasion mechanisms, a malware downloader and a variety of network- and application-layer DDoS attack vectors. This bot is now available for sale for less than $20 over the Darknet.

As published by its authors, this malware is capable of running under Windows XP/7/8/10, both x32 and x64 versions, and has anti-virtual machine capabilities to evade security controls such as a sandbox, thereby allowing it to only infect ‘real’ machines.

Security

What Does a Windstorm in Wyoming Have to Do with Cyber Security?

February 7, 2018 — by Carl Herberger0

windstorm-cyber-attack-960x640.jpg

Natural disasters serve as excellent examples of the unforeseen consequences that a cyber-attack against infrastructure will have. Take for example a strong windstorm in Wyoming in February 2017. The storm knocked down power lines, forcing water and sewage treatment plants to operate on backup generators, which weren’t available to some of the pumps that moved sewage from low-lying areas to higher ground. As a result, the sewers backed up after the weather continued to prolonged the outage. While government officials tasked with disaster planning have long focused on the cascading effects of power outages from natural disasters, only recently have they realized the effects of cyber warfare could be quite similar.