DaveLarson

About Dave Larson

Dave Larson, Chief Operating Officer is responsible for directing the Corero technology strategy as the company continues to invest in its next phase of growth; providing next generation DDoS attack and cyber threat defense solutions for the Service Provider and Hosting Provider segments. Larson brings over 20 years of experience in the network security, data communication, and data center infrastructure industries.

Posts by Dave Larson

DDoS Attack Predictions for 2017

What challenges and changes will 2017 bring to the DDoS threat landscape? And why is there reason to be optimistic that the number of volumetric DDoS attacks will decrease in the next few years? Read our predictions for 2017.

Read more

Corero Team Discovers a New DDoS Vector

The Corero research team has discovered a new distributed denial of service (DDoS) Reflection/Amplification attack vector that leverages Connectionless Lightweight Directory Access Protocol (CLDAP UDP:389).

Read more

SDN and NVF: Blessing or a Curse for DDoS Security?

Software Defined Networks (SDN) and Network Functions Virtualization (NFV) technologies are growing more common, but they are inherently vulnerable to DDoS attacks.

Read more

Improper Network Configuration Can Lead to DDoS Attacks

Recent research found that cyber attackers can launch DDoS attacks by abusing improperly configured DNSSEC (Domain Name System Security Extensions) domains. Learn how to protect your network, whether it includes DNS service or not.

Read more

Can The Criminal Justice System Thwart Botnet-Driven DDoS Attacks?

In mid-May three senators on Capitol Hill introduced a bill (S.2931 - Botnet Prevention Act of 2016) that aims to give law enforcement and the courts more teeth when it comes to going after cybercriminals, especially those that launch botnet-drive DDoS attacks. It's a nice idea, but will it work?

Read more

Hosting Providers Can Capitalize on DDoS Protection as a Service

The majority of hosting provider customers expect the provider to ensure “clean pipe.” Here's a summary of a webinar that we co-presented with Web Host Industry Review (WHIR), which discusses how hosting providers can implement the most comprehensive level of DDoS protection to eliminate DDoS attack traffic from their networks, and offer that DDoS protection as a value-added service to their customers.

Read more

Survey: DDoS Attacks Cause Loss of Customer Trust & Decreased Revenues

We've released the results of our annual DDoS Impact Survey, which polled technology decision makers, network operators and security experts about key DDoS issues and trends that Internet service providers and businesses face in 2016. Nearly half (45%) of the survey participants indicated that loss of customer trust is the most damaging consequence of DDoS attacks to businesses. See our infographic that sums up rest of the survey results!

Read more

Cyber Warfare or Hacktivism? DDoS Attacks Can Be Used Either Way

Recent DDoS attacks on government and corporate websites in Sweden, Finland and Switzerland illustrate that DDoS can be used as either cyber warfare or political hacktivism.

Read more

The Dangers of Short-Duration, Sub-Saturating DDoS Attacks

Many organizations aren’t even aware of when their sites are experiencing a DDoS attack, because the majority of attacks are under 1 Gbps, and are perceived as only annoying “noise” in the IT background; the attacks are not large enough to get the attention of IT security staff. That doesn’t mean they should be ignored, however. Unseen, low-level DDoS attacks cause two problems.

Read more

Introducing the Corero Virtual Edition (vNTD) Monitor – a DDoS Detection Engine

Last week we announced a new product: vNTD Monitor, which provides the freedom and flexibility to monitor DDoS activity in real-time against any server, application or network. This industry-leading technology provides visibility of attack traffic, intuitive analytics and alerting of DDoS attack vectors targeting a system or workload.

Read more

DDoS Mitigation Solutions Have Evolved from Cost Item to Revenue Opportunity

Now that DDoS mitigation solutions are more affordable and scalable, there is opportunity to not only save on operational and bandwidth costs, but also to generate new revenue. Service providers can turn mitigation structure around to re-sell it as a service to their customers downstream.

Read more

If it looks like a duck, quacks like a duck and walks like a duck…

Several high profile organizations experienced ‘unexplained’ service outages yesterday, begging the question “is there any connection across these discrete outages”. All trading on the New York Stock Exchange was halted for nearly four hours for undisclosed internal technical reasons, while a so-called technical glitch halted United Airlines flights around the country for about two hours. The Wall Street Journal’s web site was also rendered unavailable just after the NYSE halted trading.

Read more

Can we “squelch” DDoS attacks, closer to the source?

A DDoS focused report released by Neustar earlier this week caught my eye with a statement made by Neustar Senior Vice President and Fellow, Rodney Joffe. Rodney makes an interesting recommendation around the need to “develop industry-based mitigation technologies that incorporate mechanisms to distribute attack source information into ISPs,...

Read more

Shellshock – Picking up the Pieces

4.1 million. That’s the number of news items, blogs, webpages, reports, and opinion articles related to the recently discovered ‘Shellshock’ (Bash) vulnerability that were matched via a quick Google search for ‘Shellshock bash bug’ this morning. There’s no denying that this vulnerability is one of the...

Read more

NATO Nations work to level the playing field in response to cyber attacks

It has been interesting to see news recently of a NATO agreement that indicated that member states would now come to each other’s aid in the event of digital attacks as well as in the case of military attacks.  This newly signed deal reaffirms that cyber defense is now, more than ever critical component to a Nation’s comprehensive...

Read more