When evaluating Distributed Denial of Service (DDoS) protection for your business what are the top questions you should be asking from a managed service provider? You know that checking the box with a Firewall or IPS device combo is not enough to protect your organization from potential DDoS attacks. Today's threats...
API endpoints have become a weak link in today's enterprise networks. Organizations are deploying Application Program Interface (API)
endpoints at an ever-increasing rate to keep up with the demands of
mobile applications, server-to-server communication, and microservice
requirements. This creates a broader attack...
A recent analyst report stated 80% of respondents confirmed the use of Web Application Firewalls (WAFs) to protect public-facing websites and applications, but most have remained concerned their WAFs may not be covering all of their security requirements. Your basic WAFs could be risking your data to theft and...
Police recently arrested the suspected administrators and top users of the stresser/booter service Webstresser.org. Unfortunately, the plethora of such services means the world is unlikely to see a reduction in DDoS attack volumes, says Darren Anstee of Arbor Networks.
Old technology never dies, but rather fades "very slowly" away, as evidenced by there being 21 million FTP servers still in use, says Rapid7's Tod Beardsley. Rapid7's scans of the internet have also revealed a worrying number of internet-exposed databases, memcached servers and poorly secured VoIP devices.
What are hot cybersecurity topics in Scotland? The "International Conference on Big Data in Cyber Security" in Edinburgh focused on everything from securing the internet of things the rise of CEO fraud to the origins of "cyber" and how to conduct digital forensic investigations on cloud servers.
When June arrives in the United Kingdom, that means it's time for the annual Infosecurity Europe conference in London. Here are visual highlights from this year's event, which featured 240 sessions, 400 exhibitors and an estimated 19,500 attendees.
Although every action on the Internet relies on the Domain Name
System (DNS), many organizations fail to install corresponding
Download this whitepaper and learn why:
Malicious actors have evolved their methods to leverage the
vulnerabilities of recursive DNS
Cybercriminals are using the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing attacks, malware and ransomware campaigns, and data exfiltration against companies. How are you proactively protecting your network and users from these targeted threats?
Download this whitepaper...
Traditional hub-and-spoke networking architectures, and the castle-and-moat security they utilize, aren't amenable for today's burgeoning cloud-and-mobile world.
A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you...
The Department of Homeland Security has issued two more alerts about cyber vulnerabilities in certain medical devices. The stream of recent advisories is helping to draw more attention to the importance of addressing device security. But healthcare providers face the challenge of tracking and mitigating all risks.
A recent analyst report stated 80% of respondents confirmed the use of Web Application Firewalls (WAFs) to protect public-facing websites and applications, but most have remained frustrated, disappointed, and concerned that their WAFs may not be covering all of their security requirements. Your basic and/or outdated...
Hackers have reportedly demanded a ransom from Bank of Montreal and Simplii Financial in exchange for not dumping 90,000 customers' account details on a fraud forum. The FBI says online extortion and ransomware remain the top two types of cybercrime it's seeing today.
John Gammell of New Mexico has been sentenced to serve 15 years in prison for launching DDoS attacks against prior employers and business competitors, as well as for being a convicted felon in possession of firearms.