• DDoS Chronicles

    The only way to fight today’s cyber-attacks is to be prepared. Read these short articles that provide observations, explanations and information about today’s threat landscape.

    Language of Cyber Security

    Every day, new cyber security attacks are discovered. How can we prepare for the challenge? Knowledge is the answer! Stay aware of the latest threats and vulnerabilities and familiarize yourself with the language of cyber security.

    The Never-Ending Hack

    In 2012, Dropbox, the popular file hosting service, was the victim of a largescale cyber-attack during which attackers obtained large volumes of email and password data. It has been recently discovered that the data stolen in the 2012 breach has been leaked and that over 68 million accounts have been comprised.

    In the Crosshairs: Six Cyber Security Threats Gunning for Your Online Business

    In today’s hyper-connected world, nearly all businesses, regardless of size or industry, have some element of their operations based online. From the largest online retailers and financial service companies to gaming and social media brands, organizations are transforming how they conduct business and have become increasingly dependent on network-based services.

    Cyber Protection: – 4 Critical Steps for Protecting Your Online Business

    Businesses of all sizes, across all verticals, generate significant sales online, increasing their risk and exposure from outages and breaches. Unfortunately, malicious actors understand this and target online businesses with this in mind.

    What Is Ransomware?

    You are catching up on some Web surfing using your favorite mobile device, when all of a sudden everything freezes and you receive a message telling you...

    DDoS Attack Protection From 4 Main Cyber Threats: Crime, Hactivism, Espionage and War

    Richard Clarke, a former White House cyber security adviser, coined the acronym CHEW to refer to the four main threats: crime, hactivism, espionage, and war.

    IDC Agrees: Single Vendor Hybrid Provides Ideal Cyber-Attack Protection

    A definitive trend in the cyber-security market is the movement towards “hybrid” DDoS protection solutions. In Radware’s 2014-2015 Global Network & Application Security Report, we can see that many information security practitioners have either already implemented hybrid technologies (36% of survey respondents), or plan to by the end of 2015 (48%).