main

Security

The Evolving Network Security Environment – Can You Protect Your Customers in a 5G Universe?

July 17, 2018 — by Louis Scialabba0

5g-iot-ebook-960x679.jpg

Smart Farming depends on internet of things (IoT) devices and sensors to monitor vast farm fields, guiding farmers’ decisions about crop management through rich data. But it only takes one security flaw for all stakeholders within the ecosystem to be impacted. If hackers gain access to a single sensor, they can navigate their way to the farm-management application servers and manipulate data. Crop productivity levels are falsified, both basic and complex condition-monitoring systems are distorted, and real-time harm occurs through automatic IoT sensors. At stake is not only the productivity of crops, but the food that supplies livestock and humans: What if there was no corn for you?

Attack Types & VectorsDDoSSecurity

How to Prepare for a DDoS Attack

March 29, 2016 — by Ron Winward0

prepare-for-ddos-attack-2-960x621.png

Our 2015-2016 Global Network & Application Security Report documented that 51% of businesses suffered a DDoS attack in 2015.  Further, 90% of businesses suffered some sort of cyber attack during that same period.  This is an astonishing number and as network operators, we need to be prepared.  DDoS attacks can be a debilitating event to your business, but they don’t have to be.  If you’re prepared, you can help control the outcome.

Attack Types & VectorsSecuritySSL

When Trends Collide – Ransomware and IoT Attacks Continue

March 8, 2016 — by Ben Desjardins0

ransomware-iot-attacks-2-960x693.png

A highlight of the annual Global Network & Application Security Report is always the deep case studies. Each year, we work closely with a customer that has made the difficult, but admirable decision to shine a light on their experiences as a victim of a cyber-security attack.  By sharing, these customers can help others prepare for what now is sadly an inevitable experience for many companies.

DDoSSecurity

Your Internet or Your Candy

March 2, 2016 — by David Storch0

internet-or-candy-2-960x629.png

David Storch is a Product Manager and Principal Consultant at Atos and a featured guest blogger

According to the UK’s The Telegraph, ‘eight out of ten parents with children aged 14 or under say restricting their offspring’s use of gadgets is their preferred form of discipline because it stopped them from communicating with their friends. Youngsters saw having their tablets and phones taken away as the worst method of punishment.’

Attack Types & VectorsSecuritySSL

Could Your Network Survive APDoS or Hit-and-Run DDoS?

February 25, 2016 — by Ben Zilberman2

beyond-volumetric-attacks-sharks.png

Can you guess where a network breach first occurs?

When a CISO asked this question during a recent business trip my answer was simple:  “Sure! In the first line of defense.”  Trying to improve my chances, I quickly added, “You know what, it’s when employees share on social networks and unintentionally provide puzzle pieces to potential perpetrators.”

“No,” he said. “It happens in the CISO’s mind. At the very moment they feel secure enough…”

Security

The Value of Letting the Technical Professionals Select a Security Vendor

February 23, 2016 — by David Monahan0

security-vendor-2-960x639.jpg

David Monahan is Research Director for Enterprise Management Associates (EMA) and is a featured guest blogger.

Management is ultimately responsible for the security of an organization. At each level, the appropriate manager decides which of the precious dollars, assets, and personnel under his or her control should be allocated for each aspect of the business, security being one of the many competing functions.

Cloud SecurityDDoSSecurity

Network-as-a-Sensor: A New Approach to the DDoS Problem

February 17, 2016 — by Ron Meyran1

network-as-a-sensor-2-960x480.jpg

Mike Geller from Cisco’s CTO office and Ehud Doron of Radware’s CTO office presented at Cisco Live Berlin 2016 the revolutionary concept of Network-as-a-Sensor to fight DDoS attacks.

There are two approaches to detect against DDoS attacks: on-premise (also sometimes called in-line) and Cloud (out of path). When a DDoS protection solution is deployed on-premise, organizations benefit from an immediate and automatic attack detection and DDoS mitigation solution. Within seconds from the start of an attack, the online services are well protected and the attack is mitigated.

Attack Types & VectorsCloud SecurityDDoSSecuritySSL

Cyber-Attackers Are Adjusting to the Security Adjustments You’ve Made

February 16, 2016 — by Ben Desjardins0

cyberattack-adjustments-2-960x580.jpg

Sometimes it feels terrible to be right. In our recent Global Application & Network Security Report we predicted an increase in complex encrypted attack vectors and the importance of putting in place adequate defenses that can scale and inspect encrypted traffic.  Just last week, we got a vivid example of the increasing threat posed by encrypted attack vectors. A high profile attack occurred with an organization that had both a combination of on-premises and cloud-based DDoS protection, yet the organization’s site still went down, in large part because the attack “hid” from detection by the cloud-based resources by using encryption.

Attack Types & VectorsSecurity

Best Practices for Hybrid Cloud/On-Premise Attack Mitigation

February 1, 2016 — by Ben Zilberman0

hybrid-mitigation-2-960x720.jpg

The cybersecurity industry keeps us all on our toes trying to follow up with solutions and breakthrough technologies – not only in advanced security capabilities, but also with state of the art methods of management and integration with other network security elements.

You want your security elements to play together in a well synchronized manner. You wouldn’t want to have to intervene to frequently make manual adjustments, would you?