With the increasing complexity of DDoS attack vectors, comes the evolving need to continually revaluate your DDoS protection strategy. The situation is only further complicated by new attack motives and the exponential abundance of vulnerable IoT devices.
To properly conduct a quantitative risk analysis, download...
When evaluating Distributed Denial of Service (DDoS) protection for your business what are the top questions you should be asking from a managed service provider? You know that checking the box with a Firewall or IPS device combo is not enough to protect your organization from potential DDoS attacks. Today's threats...
API endpoints have become a weak link in today's enterprise networks. Organizations are deploying Application Program Interface (API)
endpoints at an ever-increasing rate to keep up with the demands of
mobile applications, server-to-server communication, and microservice
requirements. This creates a broader attack...
Transitioning from MSP to MSSP is a well-trodden path and there are a lot of best practices to increase chances of success.
Success is due to people, processes, and tech in equal proportions. Generally, new MSSPs should pick a core set of competencies and branch outward from there.
In this white paper, Garrett...
Police recently arrested the suspected administrators and top users of the stresser/booter service Webstresser.org. Unfortunately, the plethora of such services means the world is unlikely to see a reduction in DDoS attack volumes, says Darren Anstee of Arbor Networks.
Old technology never dies, but rather fades "very slowly" away, as evidenced by there being 21 million FTP servers still in use, says Rapid7's Tod Beardsley. Rapid7's scans of the internet have also revealed a worrying number of internet-exposed databases, memcached servers and poorly secured VoIP devices.
What are hot cybersecurity topics in Scotland? The "International Conference on Big Data in Cyber Security" in Edinburgh focused on everything from securing the internet of things the rise of CEO fraud to the origins of "cyber" and how to conduct digital forensic investigations on cloud servers.
When June arrives in the United Kingdom, that means it's time for the annual Infosecurity Europe conference in London. Here are visual highlights from this year's event, which featured 240 sessions, 400 exhibitors and an estimated 19,500 attendees.
While many organizations have adopted a defense-in-depth strategy, most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses.
But this infrastructure doesn't have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can...
Although every action on the Internet relies on the Domain Name
System (DNS), many organizations fail to install corresponding
Download this whitepaper and learn why:
Malicious actors have evolved their methods to leverage the
vulnerabilities of recursive DNS
Cybercriminals are using the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing attacks, malware and ransomware campaigns, and data exfiltration against companies. How are you proactively protecting your network and users from these targeted threats?
Download this whitepaper...
Malicious actors are increasingly utilizing the recursive DNS
infrastructure to launch damaging phishing attacks, malware and
ransomware campaigns, and data exfiltration against companies.
Proactively protecting your company against such threats at the
DNS control-point, as opposed to retroactive...
Traditional hub-and-spoke networking architectures, and the
castle-and-moat they utilize, aren't amenable for today's
burgeoning cloud-and-mobile world.
A zero trust and access model is the solution: Every machine,
user, and server should be untrusted until proven otherwise. But
how do you achieve...
The Department of Homeland Security has issued two more alerts about cyber vulnerabilities in certain medical devices. The stream of recent advisories is helping to draw more attention to the importance of addressing device security. But healthcare providers face the challenge of tracking and mitigating all risks.