IoT Device Security Laws Won't Eliminate DDoS Attacks

It is now common knowledge among cyber security professionals that many of the billions of IoT-connected devices around the world are not secure and, of those, many have already been leveraged by bad actors. Given this reality of the IoT-powered world we live in, organizations should seek to protect their networks from the cyber-attacks that ensue, with one of the most common being DDoS.

Read more

Automated DDoS Protection Can Reduce CISO Stress

A recent Security Magazine UK article reports on a survey by Nominet Cybersecurity that quantified the work stress today’s CISOs endure. CISOs have a Sisyphean task of protecting every IT system and point of data, yet they commonly lack adequate budget, they often suffer a shortage of qualified cybersecurity staff, and security breaches are rampant.

Read more

DDoS Considerations for On-Premises Servers

There has been much hype around cloud computing in recent years, to the extent that it appeared the answer was to run everything in ‘the cloud’, as-a-service. Now the dust has settled somewhat, there is a level of pragmatism setting in.

Read more

What is a DDoS Attack and Why Should You Worry?

A distributed denial-of-service (DDoS) attack occurs when multiple systems overwhelm the available bandwidth or other system resources of their target; as a result, an application, service or website may either crash or suffer a significantly degraded service. In an always-on world, where many organizations rely on constant Internet connectivity to conduct business online, DDoS attacks are a serious issue.

Read more

Evolving DDoS Threat Challenges Service Provider Capacity

The DDoS threat continues to grow in sophistication as cybercriminals improve their attack techniques in an attempt to evade the trusted mitigation methodologies typically used for DDoS protection.

Read more

More Posts