• DDoS Chronicles

    The only way to fight today’s cyber-attacks is to be prepared. Read these short articles that provide observations, explanations and information about today’s threat landscape.

    See Through the DDoS Smokescreen to Protect Sensitive Data

    Hackers are now using attacks as the means to another, potentially more devastating, end: stealing data. In these attacks, cybercriminals distract business and IT resources to pursue larger objectives. The key is being prepared and having the proper DDoS detection and mitigation solutions and processes in place.

    Language of Cyber Security

    Every day, new cyber security attacks are discovered. How can we prepare for the challenge? Knowledge is the answer! Stay aware of the latest threats and vulnerabilities and familiarize yourself with the language of cyber security.

    To Pay or Not to Pay: Ransom-Based Cyber-Attacks on the Rise

    Like a flu bug that morphs and mutates only to come back stronger, ransomware is here to stay. Unfortunately, there is no vaccine to stop this type of malware and much of its staying power can be attributed to the creativity of its authors.

    The Changing Workforce: Automation & the Role of Ex-Hackers

    With cyber defenses succumbing to a dizzying array of attack vectors and new techniques, the security professionals fighting the battles of 21st century cyber wars will look and think a lot differently than those of the past.

    The Never-Ending Hack

    In 2012, Dropbox, the popular file hosting service, was the victim of a largescale cyber-attack during which attackers obtained large volumes of email and password data. It has been recently discovered that the data stolen in the 2012 breach has been leaked and that over 68 million accounts have been comprised.

    IoT: Internet of Things or Internet of Threats?

    With the IoT, the physical world is becoming one big information system with the ultimate goal of improving quality of life and empowering new business models. However, this also means that more personal information and business data will reside in the cloud and be exchanged between thousands of devices that may have exploitable vulnerabilities.

    In the Crosshairs: Six Cyber Security Threats Gunning for Your Online Business

    In today’s hyper-connected world, nearly all businesses, regardless of size or industry, have some element of their operations based online. From the largest online retailers and financial service companies to gaming and social media brands, organizations are transforming how they conduct business and have become increasingly dependent on network-based services.