Much more than Outage: 2013 DDoS Market Review What comes to mind when the term “Denial of Service” is mentioned? Probably website outage. This image has been crafted… Motty Alon | January 27, 2014
Inside the World of Hacker Reconnaissance The inventor of the telephone, Alexander Graham Bell once stated, "Before anything else, preparation is the key to success." Unfortunately,… Eyal Benishti | March 19, 2013
Stock Exchanges in the Line of Fire During last week’s RSA conference in San Francisco, I gave a lecture titled "Stock Exchanges in the Line of Fire… Ziv Gadot | March 6, 2013
New Attack Trends – Are You Bringing a Knife to the Gunfight? Today, we launched our 2012 Global Application and Network Security report. It was prepared by our security experts – the… Ziv Gadot | January 22, 2013
Security Week Article: The Missing Layer Against Encrypted Attacks I recently contributed another column to Security Week about attackers launching attacks over HTTPS more than ever before. With an… Avi Chesla | December 5, 2012
Security Week Article: The Need for Resource-Aware Mitigation Technology Recently, I wrote an article for Security Week on the growing need for security solutions to manage under-the-radar attack tools… Avi Chesla | August 21, 2012
2011: Why has Group Anonymous Been So Successful? As we shut the door on 2011 and begin the planning efforts for 2012, I can’t help but be astonished… Carl Herberger | January 4, 2012
DoS Attack Forensic: Following Sherlock Holmes Footsteps Denial-of-Service (DoS) Attack forensics has several motivations. When under attack, this process is important to identify the attacker and safely… Ziv Gadot | August 2, 2011