DDoS

DDoS News

  • April 08, 2015 08 Apr'15

    Dyre malware returns to rob banks of millions

    Financial malware Dyre, in tandem with social engineering, was used in a new campaign to steal millions from financial institutions, according to IBM researchers.

  • April 08, 2015 08 Apr'15

    The IoT is worth $3 billion to IBM. What's it worth to CIOs?

    IBM bets $3 billion on a dedicated IoT business group, but CIOs might want to hedge their bets on an IoT partner, says one analyst. Also in Searchlight: Silicon Valley execs rally against anti-LGBT laws; GitHub gets blasted by denial-of-service attacks.

  • April 03, 2015 03 Apr'15

    The IoT is worth $3 billion to IBM. What's it worth to CIOs?

    IBM bets $3 billion on a dedicated IoT business group, but CIOs might want to hedge their bets on an IoT partner, says one analyst. Also in Searchlight: Silicon Valley execs rally against anti-LGBT laws; GitHub gets blasted by denial-of-service attacks.

  • April 02, 2015 02 Apr'15

    Massive GitHub DDoS attack tied to Chinese government

    Security experts say the largest DDoS attack in GitHub history, which lasted five days, was the work of the Chinese government.

View All News

DDoS Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate DDoS Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage DDoS

Learn to apply best practices and optimize your operations.

  • Defending against the digital invasion

    As attackers move beyond “spray and pray” tactics to advanced persistent threats -- having better security than your competitors is no longer enough. Targeted attacks today are often for financial gain through extortion and threats to expose or delete sensitive data, and organizations need to make sure they’re prepared. We cover countermeasures to help organizations defend against evolving attack techniques and detect intrusions faster to minimize the damage. Johannes Ullrich, SANS Institute CTO and head of the Internet Storm Center, outlines the top emerging cyberthreats in 2015, from the Internet of Things and bring your own device to subtle data manipulations that influence business decisions and enterprise ransomware.

    Another big problem with security continues to be social engineering, which we also look at in this issue. Many organizations are moving beyond prevention to detection strategies, including automated breach detection and data-centric security measures. We also look at cybersecurity hiring strategies, employee development and ways to address geographical shortfalls. As some salaries skyrocket after a breach-laden 2014, is cybersecurity hiring in a state of crisis?

    Privacy Professor CEO Rebecca Herold shares her take on third-party security measures with Marcus Ranum. She offers solid advice on ways to hold contractors accountable. Finally, Editorial Director Robert Richardson looks at big data analytics as commercial tools, whose origins can be traced to NSA engineers, start to become available for large enterprises. Continue Reading

  • Beyond the Page: Web security meets DDoS

    As DDoS attacks become more sophisticated it gets harder to detect and defend against them. John Pescatore describes new DDoS attack vectors and discusses incident response planning to combat these attacks today. Continue Reading

  • In denial about DDoS: Defense planning falls short

    Advanced distributed denial-of-service attackers are using a mix of techniques to hit targeted victims in ways all too similar to advanced persistent threats. DDoS defense planning is still lax at many enterprises, but if you do not have mitigation processes in place, it will cost you. Response, brand reputation and opportunity costs quickly add up in major attacks. The primary cost for victims, tied to the length of the outage, is revenue interruption says John Pescatore, director of emerging trends at the SANS Institute. The former Gartner analyst looks at the current denial-of-service landscape and associated costs in his article, “DDoS defense planning falls short.” Adam Rice and James Ringold continue their series on APTs. In their article “Man versus machine data,” the authors outline strategies to implement verbose logging across the enterprise and discuss the promise of big data security analytics to help security professionals track the APT lifecycle. The hard issues around intellectual property protection and the steps enterprises and vendors are taking to address them are also covered this month in Feature Editor Kathleen Richards’ article, “Breaches reignite intellectual property protection.” We also welcome back longtime columnist Marcus Ranum, who starts off the year chatting about metrics with IBM’s Diana Kelley. Security 7 winner Frederick P. Chang, Ph.D., offers his take on what is needed to take cybersecurity education and science to the next level. Continue Reading

View All Manage

Problem Solve DDoS Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close