• DDoS Chronicles

    The only way to fight today’s cyber-attacks is to be prepared. Read these short articles that provide observations, explanations and information about today’s threat landscape.

    Evolve and Adapt: Why DevOps is Raising the Bar Security Solutions

    DevOps and agile software development practices is creating dynamic IT infrastructures that require adaptive security solutions to safeguard them.

    History of DDoS Attacks

    Since the first DoS attack was launched in 1974, DDoS attacks and other DoS attacks have remained among the most persistent and damaging cyber-attacks. These attacks reflect hackers’ frustratingly high levels of tenacity and creativity—and create complex and dynamic challenges for anyone responsible for cyber security.

    Anatomy of a Hacker

    This piece profiles the various types of hackers, their motivations, and the tools of the trade. In the old days, hacking was as much an art as it was a science. It required a distinct set of skills, proficiencies and capabilities. Today, attack services are purchased and sold via the Clearnet and Darknet.

    DDoS Protection: See Through the Smokescreen of DDoS Attacks to Protect Sensitive Data

    Hackers are now using attacks as the means to another, potentially more devastating, end: stealing data. In these attacks, cybercriminals distract business and IT resources to pursue larger objectives. The key is being prepared and having the proper DDoS detection and mitigation solutions and processes in place.

    Language of Cyber Security

    Every day, new cyber security attacks are discovered. How can we prepare for the challenge? Knowledge is the answer! Stay aware of the latest threats and vulnerabilities and familiarize yourself with the language of cyber security.

    The Never-Ending Hack

    In 2012, Dropbox, the popular file hosting service, was the victim of a largescale cyber-attack during which attackers obtained large volumes of email and password data. It has been recently discovered that the data stolen in the 2012 breach has been leaked and that over 68 million accounts have been comprised.

    In the Crosshairs: Six Cyber Security Threats Gunning for Your Online Business

    In today’s hyper-connected world, nearly all businesses, regardless of size or industry, have some element of their operations based online. From the largest online retailers and financial service companies to gaming and social media brands, organizations are transforming how they conduct business and have become increasingly dependent on network-based services.