Arbor Networks
7 free cyber threat maps showing attack intensity and frequency
Cyber threat maps are one of the most visually engaging tools in the arsenal of cybersecurity professionals. These real-time visualizations provide a global perspective on …
OneSpan appoints Matthew Moynahan as President and CEO
OneSpan announced that the Company’s Board of Directors has appointed Matthew Moynahan as President and Chief Executive Officer effective November 29, 2021. Mr. Moynahan …
Intensifying DDoS attacks: Choosing your defensive strategy
One of the biggest misconception regarding DDoS attacks is that they are a once-in-a-lifetime event for organizations, says Josh Shaul, VP of Web Security at Akamai. …
Surge in memcached-based reflected DDoS attacks is due to misconfigured servers
Massive memcached-based reflection DDoS attacks with an unprecedented amplification factor have been ongoing for the last few days, by taking advantage of memcached servers …
Infosec expert viewpoint: DDoS attacks
DDoS attacks have become more extensive and are testing the limits of existing DDoS mitigation tools and practices, as well as affecting online businesses globally. …
Forget about the malware, go after attackers’ tactics, techniques and procedures
The cybercriminal’s options for monetizing attacks has never been broader, less complex, or less risky, and attempts to detect intrusions by detecting the malware they …
Industry reactions to the Verizon 2017 Data Breach Investigations Report
Nearly 2,000 breaches were analyzed in this year’s Verizon 2017 Data Breach Investigations Report and more than 300 were espionage-related. Here are some of the comments Help …
Monitoring scanning activities that could lead to IoT compromises
IoT devices are ideal targets for attackers looking to build DDoS botnets because they have limited or non-existent security features. Some IoT devices utilize hard-coded …
Innovation and exploitation fuel DDoS attack landscape
Arbor Networks released its 12th Annual Worldwide Infrastructure Security Report offering direct insights from network and security professionals at global service providers, …
New infosec products of the week: December 9, 2016
Thales releases advanced encryption solutions for secure docker containers Thales released new capabilities for its Vormetric Data Security Platform. These advances extend …
Building the IoT monster
When Mary Shelley wrote Frankenstein, she imagined the misguided doctor assembling his creature from dead body parts, who instead of elevating science, created something dark …
Over one-third of Americans have been hacked
Two-thirds of Americans believe themselves to be tech savvy, although their actions with regard to online security indicate otherwise – with millennials being the worst …