Every organization with a website - especially one that requires its users to have regular access to sensitive information - should take urgent and appropriate steps to protect against DoS and DDoS attacks. Failure to do so can result in huge financial losses as well as a damaged public reputation. This DDoS Survival...
Distributed-denial-of-service attacks are perfect weapons for cybercriminals and political adversaries, says Prolexic's Scott Hammack, who explains why any organization with an online presence should brace itself for attacks.
Cyberthreats, including distributed-denial-of-service attacks, are growing worldwide. So FS-ISAC is expanding its information sharing efforts internationally to help financial institutions counter the threats, says Bill Nelson, the organization's president.
Although major healthcare data breaches appear to be on the decline this year, losses and thefts of unencrypted devices continue to be a problem. Bill Lazarus of Stanford Medicine explains how his organization is tackling the issue.
Until recently, distributed denial of service (DDoS) attacks had been part of infosec lore: something you heard about but rarely experienced. With the rise of hacktivist groups and other cybercriminal organizations, DDoS has once again raised its ugly head. Today, these attacks are one of the most prevalent...
Since last fall, several waves of distributed-denial-of-service (DDoS) attacks have targeted major players in the U.S. banking industry. Eventually, the top 50 institutions found themselves in the crosshairs. Websites crashed, customers couldn't connect to make transactions and banks scrambled to get back online - and...
In defending against distributed-denial-of-service attacks, enterprises must comprehend the motives of the cyber-assailant, Booz Allen Hamilton's Sedar Labarre says. He outlines how organizations should assess their risks.
An HHS inspector general report on the shortcomings of a government contractor's USB drive security practices is a reminder of why all healthcare organizations need to control the use of mobile storage media and ports.
Robert Bigman, former CISO at the CIA, says many government agencies and other organizations have yet to take adequate steps to prevent rogue systems administrators from accessing sensitive information on systems they manage.
Proactive DDoS threat mitigation may be one of the easiest and most cost-effective tactics for minimizing financial risk associated with IT-related downtime. This paper draws on Verisign's DDoS mitigation expertise to examine the threat of DDoS in the context of IT availability and enterprise risk management.
The...
Given the extraordinary and rapid changes in the DDoS terrain, traditional DDoS mitigation tactics are no longer sufficient to protect an organization's critical web systems. Verisign has identified a set of best practices that enables organizations to keep pace with DDoS attacks while minimizing impact on business...
Distributed denial of service (DDoS) malware and tools threaten an organization's Internet-facing systems. This technical brief covers DDoS-enabled malware and several DDoS-specific tools, their capabilities and the network indicators they generate while performing the attack methods. It includes new attack vectors...
Researcher Billy Rios and a partner found password vulnerabilities in 300 medical devices, prompting the Department of Homeland Security to issue a security advisory to device manufacturers, healthcare facilities and users.
Cyber-attacks will become more destructive within three to five years, predicts Art Coviello, executive chairman of the security firm RSA. Find out the reasons behind his prediction.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.