June 10, 2016
As the University of Calgary contends with a ransomware attack, the actors behind CryptXXX are rolling out patches and upgrades and attackers are shifting from Angler to Neutrino EK.
April 26, 2016
The 2016 Verizon DBIR skimps on data breach analysis and instead focuses on common issues, such as phishing, vulnerability management and access controls, which are still befuddling IT pros.
February 24, 2016
Cybersecurity company Nexusguard said it implemented SDN technology to fight large DDoS attacks -- automating routing decisions and scaling network resources.
January 18, 2016
The Internet Systems Consortium released a critical patch for DHCP servers that fixed a flaw that could lead to denial-of-service attacks.
DDoS Get Started
Bring yourself up to speed with our introductory content
Attackers are targeting the SSDP protocol to amplify the effects of DDoS attacks. Learn what this protocol does and how to secure it. Continue Reading
SSH security can be threatened by many kinds of attacks, but there are also several steps enterprises can take to protect against them. Expert Dejan Lukan explains. Continue Reading
Data protection expert Winn Schwartau discusses information security and why companies should remember the past when developing cybersecurity strategy. Continue Reading
Evaluate DDoS Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Before starting cloud penetration testing, there a few things to keep in mind. Expert Frank Siemons discusses limitations and techniques for pen testing cloud platforms. Continue Reading
Despite popular belief, a small to medium-sized business can be a target of cybercriminals because of limited security. Expert Mike O. Villegas advises SMBs on security defenses. Continue Reading
The Alcatel-Lucent UC portfolio, including the OpenTouch Business Edition and OmniPCX platforms, offers a wide range of features for both small and large organizations. Continue Reading
Learn to apply best practices and optimize your operations.
There are many security risks for cloud-based gaming platforms. Expert Frank Siemons explains what's happened to gaming providers like Sony and Steam. Continue Reading
DNS rerouting by cloud security service providers may not be enough for DDoS mitigation when attackers can uncover targets through alternate means. Expert Ed Moyle explains. Continue Reading
Thirty years after creating the Internet's domain name system, co-creator Paul Mockapetris talks about addressing Internet challenges with a more secure DNS. Continue Reading
Problem Solve DDoS Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Cloud security providers protect enterprises from DDoS attacks, but attackers can still find the origin IP addresses. Expert Rob Shapland explains why that's a significant threat. Continue Reading
Our small colocation provider's other customers have been under DDoS attacks that affected our infrastructure. The colo null routes the bad IP address; meanwhile, our connectivity is poor. Continue Reading
Lethal threats to enterprise information security are emerging from every which way. This ISM Insider Edition looks at what security professionals are up against: state-sponsored attacks, the rise of hacking via social media, and the spread of small, relatively autonomous devices with sensors and networking chips.
Besides the need to watch out for attacks from China, North Korea and other nations, today’s security pros must beware of the individual hacker, who has become more potent. Blended threats and improvements to man-in-the-middle exploit kits have made malware more available to less-skilled cybercriminals who can now launch drive-by attacks with just a few mouse clicks. Continue Reading