Enterprise DDoS Protection Posts

The Value of Traffic Analytics for DDoS Attacks

Distinguishing DDoS attacks from legitimate traffic, in real-time, is not easy. Many organizations have little visibility into these types of security events and when these events do occur, security analysts are typically left to react to the threats after the damage has been done. Fortunately, there are now solutions available that provide real-time, analysis needed to accurately identify any traffic flows linked to DDoS attacks.

Read more

Cyberattack on UK’s Labour Party Shows Importance of DDoS Protection

Britain's opposition Labour Party suffered two cyberattacks early this week, causing concern from party leaders that cyber criminals can interfere with the election process. The attack appears to be another politically motivated DDoS attack. Incidents like this clearly demonstrate the need to have DDoS protection as part of a comprehensive cybersecurity defense.

Read more

Learning from the Amazon Web Services (AWS) DDoS Attack

Amazon's cloud computing division AWS was hit by an eight-hour distributed denial of service (DDoS) attack on October 22, 2019. Other cloud providers and enterprises would be wise to learn from this incident and take a proactive stance to strengthen their DDoS defenses. If it can happen to AWS, it can surely happen to any organization.

Read more

DDoS Protection Tips for Enterprises in National Cybersecurity Awareness Month

October is National Cyber Security Awareness month. In recognition of this annual event, we’re offering the following insights for enterprise IT pros to protect their networks from distributed denial of service (DDoS) attacks.

Read more

MIT Sloan Management Review Says the Best Offense is a Good Defense

Those of us in the cybersecurity industry know the Dark Web as a sophisticated hidden marketplace. The Cybersecurity at MIT Sloan researchers recently published a review that describes the many types of cyber attacks that exist in the Dark Web marketplace as well as recommendations to stem the flow of cybercrime, which we have summarized in this blog post.

Read more

View earlier posts in the archive