‘Digital transformation’ is one of those buzz terms we often hear used in the corporate world. Yet it’s not a passing fad or a trend, and most organizations are increasingly in the process of embracing it. What exactly does it mean, and how does buildi…
Tag: DDoS Mitigation
Security Vendor News
Cyber Criminals Target Live Events with DDoS Attacks
by Katerina Misuta •
Large-scale, live broadcasts of events such as film premieres, concerts, professional sporting competitions, and online gaming events are more commonplace than ever. Even before the pandemic forced many in-person events to go virtual, live events were…
Security Vendor News
What is a Zero-Day DDoS Attack – and how can you defend against one?
by Katerina Misuta •
The Corero Threat Intelligence team is constantly on the lookout for new attack vectors that cybercriminals use to launch new and more sophisticated Distributed Denial of Service (DDoS) attacks. These are commonly known as Zero-Day attacks, because the…
Security Vendor News
What’s Been Shaping the DDoS Threat Landscape Lately?
by Katerina Misuta •
What’s happening to the Distributed Denial of Service (DDoS) landscape today, compared to previous years? For one thing, there does seem to be greater awareness of the persistent and growing problem of DDoS attacks. The conflict between Russia and Ukra…
Security Vendor News
Service Providers Need DDoS Protection — For Themselves and Their Customers
by Katerina Misuta •
Service providers manage the critical infrastructure that supports Internet connectivity not only for their customers, but also for their own organization. They require robust defenses against Distributed Denial of Service (DDoS) attacksbecause, as Int…
Security Vendor News
Is your Datacenter protected against DDoS-attack downtime?
by Katerina Misuta •
Many companies have migrated some or all of their datacenter infrastructure to the cloud. From an efficiency and scalability stance, moving business or customer data to the cloud can make life easier. However, it can also expose your data because not a…
Security Vendor News
Multi-Nation Cyber Alert: Beware Russian State and Criminal DDoS Threat to Critical Infrastructure
by Katerina Misuta •
On April 20, 2022 the cybersecurity authorities of the United States, Australia, Canada, New Zealand, and the United Kingdom released a joint Cybersecurity Advisory “to warn organizations that Russia’s invasion of Ukraine could expose organizations bot…
Security Vendor News
Cyber Insurance Policies Are Stricter: Are You Covered for DDoS Attacks?
by Katerina Misuta •
As a result of the rise in cybercrime over recent years, more and more organizations have turned to cyber insurance to limit their financial risk, in case they become the victims of a cyberattack. Unfortunately, cyber insurance won’t cover every type o…
Europe, Global Security News, North America
DDoS Protection in the Age of 5G Networks, Edge Computing and Explosive Bandwidth Growth
by Shai Haim •
Service providers need a DDoS security solution to support new infrastructure innovations while overcoming the explosive growth in DDoS attack intensity and sophistication of phantom flood attacks.
The post DDoS Protection in the Age of 5G Networks, E…
Security Vendor News
Network and Cybersecurity Professionals Must Work Together to Defend Against DDoS Copy
by Danielle •
Distributed Denial of Service (DDoS) attacks are now one of the most common cyber threats, for organizations of all sizes. IT professionals are increasingly aware of this growing problem. However, when it comes to making sure that their organization h…
Security Vendor News
Network and Cybersecurity Professionals Must Work Together to Defend Against DDoS
by Danielle •
Distributed Denial of Service (DDoS) attacks are now one of the most common cyber threats, for organizations of all sizes. IT professionals are increasingly aware of this growing problem. However, when it comes to making sure that their organization h…
Security Vendor News
What to Include in a Cybersecurity Disaster Recovery Plan
by Nik Hewitt •
If the unthinkable were to happen to your business, what’s your disaster recovery plan? If bad actors were to inject ransomware into your system, what’s your process for a return to normal working? Google the words “What do I do if I have a cybersecurity breach” and the first twenty results will start with the […]
The post What to Include in a Cybersecurity Disaster Recovery Plan appeared first on Blog.
Security Vendor News
2021 in Review, Part 4: 5 Cybersecurity Topics to Watch in 2022
by Bruce Lynch •
One of the core principles of cybersecurity is not letting things “slip through the cracks”. An effective security posture depends on visibility. The more visibility you have into the environments where your data is, the more successful you will be in applying your organization’s security protocols and identifying suspicious behavior. Here are five cybersecurity issues […]
The post 2021 in Review, Part 4: 5 Cybersecurity Topics to Watch in 2022 appeared first on Blog.
Security Vendor News
2021 in Review, Part 3: 5 Things Security Professionals Were Discussing this Year
by Bruce Lynch •
Today, everyone is talking about CVE-2021-44228, and with good reason. But before that, here were five of the issues that dominated virtual “water cooler talk” in 2021: 5. Data security in the cloud Champion heavyweight boxer Mike Tyson said, “Everyone has a plan until they get punched in the face.” For many security practitioners, their […]
The post 2021 in Review, Part 3: 5 Things Security Professionals Were Discussing this Year appeared first on Blog.
Europe, Global Security News, North America
DDoS Protection, Mitigation, and Defense: 8 Essential Tips
by Ritika Singh •
DDoS protection and mitigation services are of paramount importance today in any organization’s cybersecurity strategy. Over 10 million DDoS (Distributed Denial of Service) attacks occurred in 2020 with new attack vectors and.
The post DDoS Protection,…
Security Vendor News
New reforms will enhance the security and resilience of Australia’s critical infrastructure
by Reinhart Hansen •
Improving the security of critical infrastructure has become the focus of many governments around the world, including Australia. This is because a failure or disruption in one area of critical infrastructure can have flow on effects that affect a nation’s security, economy and sovereignty. In the Australian Security Intelligence Organisation’s (ASIO) Annual Report 2020-21, Mike […]
The post New reforms will enhance the security and resilience of Australia’s critical infrastructure appeared first on Blog.
Europe, Global Security News, North America
Does Your DDoS Protection Solution Defend Against the Latest Attacks?
by Debra Price •
Enterprises must ensure that vendors are capable of defending its network & applications from the latest DDoS burst and multi-vector attacks.
The post Does Your DDoS Protection Solution Defend Against the Latest Attacks? appeared first on Radwar…
Security Vendor News
With SLAs for DDoS Mitigation, the devil is in the details
by Grainne McKeever •
When it comes to choosing the right DDoS protection there are many factors to consider including Network Capacity, Reliability, Service, Price and Time to Mitigation (TTM). In a recent survey, we asked participants what factor they considered most critical when choosing a DDoS protection solution. They listed TTM, along with quality of mitigation, as the […]
The post With SLAs for DDoS Mitigation, the devil is in the details appeared first on Blog.
Security Vendor News
DDoS attacks on VoIP and the urgent need for DDoS protection
by Grainne McKeever •
VoIP companies have recently been the target of a series of ransom Distributed Denial of Service (DDoS) attacks around the globe with UK-based VoIP providers including VoIP Unlimited, and Quebec-based company VoIP.ms being hit by aggressive and sustained attacks destabilizing their infrastructure and causing massive disruption to services. These DDoS attacks on VoIP providers have […]
The post DDoS attacks on VoIP and the urgent need for DDoS protection appeared first on Blog.
Security Vendor News
Learning how MTU and MSS work is key to using DDoS Protection as a Service
by Grainne McKeever •
Maximum Transmit Unit (MTU) and Maximum Segment Size (MSS) are two important terms you should be familiar with when venturing into the world of networking, especially if you are working with GRE and IPSEC tunnels. And if you are looking to use DDoS Protection as a service, you will need to know how MTU and […]
The post Learning how MTU and MSS work is key to using DDoS Protection as a Service appeared first on Blog.
Security Vendor News
Shorter, sharper DDoS attacks are on the rise – and attackers are sidestepping traditional mitigation approaches
by Pamela Weaver •
Imagine that your network is under attack. A couple of minutes ago, you detected a large burst of traffic, out of nowhere. Now it’s in excess of 60 Gbps, and overwhelming your network. Your mitigation service hasn’t picked up the attack yet, and you’re just about to take a closer look when it stops as […]
The post Shorter, sharper DDoS attacks are on the rise – and attackers are sidestepping traditional mitigation approaches appeared first on Blog.
Security Vendor News
The pitfalls of relying only on your ISP for DDoS protection
by Bruce Lynch •
Relying on your Internet Service Provider (ISP) for DDoS protection is like going to a restaurant known for the freshest, tastiest seafood and ordering beef. Sure, they have it on the menu and they are happy to sell it to you, but the experience is not likely to compare well to what you’d have in […]
The post The pitfalls of relying only on your ISP for DDoS protection appeared first on Blog.
Security Vendor News
Cheap and nasty: How for $100 low-skilled ransom DDoS extortionists can cripple your business
by Pamela Weaver •
Distributed Denial of Service (DDoS) attacks capable of crippling network resources and websites can be rented online for as little as $5 an hour. With an average financial impact of $100k for just one hour of downtime, that’s a serious return on cybercriminal investment. And that’s just for the ‘bargain basement’ attacks. Further up the […]
The post Cheap and nasty: How for $100 low-skilled ransom DDoS extortionists can cripple your business appeared first on Blog.
Security Vendor News
Ransom DDoS: What you need to know now
by Bruce Lynch •
According to the 2021 DDoS Threat Landscape Report, Ransom DDoS (RDoS) threats are on the rise. Imperva researchers have been monitoring threats against several of our customers where extortionists have demanded payment in BitCoin to prevent DDoS attacks. The attack patterns this year are very similar to those seen in 2020. As security teams prepare […]
The post Ransom DDoS: What you need to know now appeared first on Blog.
Security Vendor News
5 high-profile DDoS attacks that should chill you to the bone
by Bruce Lynch •
Distributed denial of service (DDoS) attacks are malicious attempts to make an online service unavailable to users, usually by temporarily interrupting or suspending the services of its hosting server. Data revealed in the 2021 DDoS Threat Landscape Report strongly suggests attacks are constantly evolving in size, volume, frequency, and complexity. The report shows that while […]
The post 5 high-profile DDoS attacks that should chill you to the bone appeared first on Blog.
Security Vendor News
The 4-phase approach smart companies take to mitigate DDoS attacks
by Bruce Lynch •
Distributed denial of service (DDoS) attacks have been a significant feature of the cyber threat landscape over the past two decades. The 2021 DDoS Threat Landscape Report reveals that attacks today are constantly evolving in complexity, volume, size, and frequency. The only constant in DDoS attacks is the attackers’ continued focus on the critical infrastructure […]
The post The 4-phase approach smart companies take to mitigate DDoS attacks appeared first on Blog.