Gaming DDoS Protection Posts

The Value of Traffic Analytics for DDoS Attacks

Distinguishing DDoS attacks from legitimate traffic, in real-time, is not easy. Many organizations have little visibility into these types of security events and when these events do occur, security analysts are typically left to react to the threats after the damage has been done. Fortunately, there are now solutions available that provide real-time, analysis needed to accurately identify any traffic flows linked to DDoS attacks.

Read more

Cyberattack on UK’s Labour Party Shows Importance of DDoS Protection

Britain's opposition Labour Party suffered two cyberattacks early this week, causing concern from party leaders that cyber criminals can interfere with the election process. The attack appears to be another politically motivated DDoS attack. Incidents like this clearly demonstrate the need to have DDoS protection as part of a comprehensive cybersecurity defense.

Read more

Learning from the Amazon Web Services (AWS) DDoS Attack

Amazon's cloud computing division AWS was hit by an eight-hour distributed denial of service (DDoS) attack on October 22, 2019. Other cloud providers and enterprises would be wise to learn from this incident and take a proactive stance to strengthen their DDoS defenses. If it can happen to AWS, it can surely happen to any organization.

Read more

MIT Sloan Management Review Says the Best Offense is a Good Defense

Those of us in the cybersecurity industry know the Dark Web as a sophisticated hidden marketplace. The Cybersecurity at MIT Sloan researchers recently published a review that describes the many types of cyber attacks that exist in the Dark Web marketplace as well as recommendations to stem the flow of cybercrime, which we have summarized in this blog post.

Read more

UK’s National Cyber Security Centre Issues Denial of Service (DoS) Guidance

The UK’s National Cyber Security Centre recently issued guidance to help organizations understand and mitigate against denial of service attacks. NCSC recommendations have good, basic information, however the guidance is lacking in that it only recommends CDN-based services and it focuses on out-scaling the attacks rather than blocking them.

Read more

View earlier posts in the archive