Find out how Radware’s DDoS protection solutions and Emergency Response Team (ERT) helped organizations detect and mitigate against today’s attacks.
Perhaps more than any other industry, security professionals at financial service firms truly are on the frontlines of today’s cyberattacks, combating everything from ransomware to SSL-based attacks. In this piece, a senior network architect at an EMEA-based international banking group shares his notable experiences protecting his organization’s network perimeter from cyber security threats.
This contributed byline form a CISO at a top-five U.S. carrier explains top attack trends from 2016 and managing expectations with executive leadership. Due to the collateral damage associated with successfully cyberattacking a service provider, it’s no surprise that these organizations are facing an increased likelihood of being attacked.
The history of IT and IT security is full of an evolving series of products designed to keep a company secure. Far more recent is the understanding that detection is insufficient; preparation and remediation just as important. In other words, it's not just about avoiding injury, but also stopping the bleeding ASAP. This paper outlines and underscores the importance of moving beyond a piecemeal approach to cyber security both in terms of technology and people.
One of the world’s largest airlines loses revenue when cyber-attacking bots act as faux buyers, thereby locking up seats and preventing it from distinguishing between the good bots that help it prosper in e-commerce and the malicious ones that force flights to takeoff only partially full. What technology did the airline rely on to distinguish the good guys from the bad?
The encrypted email service provider was the target of a ransom attack by the hacktivist group, The Armada Collective. Hoping to stop the attacks, ProtonMail paid the ransom, only to the target of additional, more sophisticated attacks combining application and network vectors.
The Chicago-based firm, Server Central, routinely identifies network and
distributed denial of service attacks, which occur as frequently as
every few days and range from small protocol floods to full-blown DDoS
attack campaigns designed to extort money. After the victim pays up, the
attacker promises to stop the DDoS attack.
In 2014, Boston Children's Hospital became the first health care
organization to be targeted by a hacktivist group. Because the hospital
uses the same Internet Service Provider (ISP) as seven other area health
care institutions, the organized DDoS attacks had the potential to
bring down multiple pieces of Boston's critical health care