September 26, 2016
A series of potent, record-setting DDoS attacks hit several targets last week and apparently used IoT malware to infect and leverage a large number of internet connect devices.
August 09, 2016
Black Hat: New research finds DDoS DNS amplification attacks are more likely to use SSDP than NTP and DDoS attacks may generally be smaller than reported.
July 22, 2016
A DNS DDoS attack hit the Library of Congress, disrupting various Library services and websites for three days before IT staff was able to restore normal functionality.
June 10, 2016
As the University of Calgary contends with a ransomware attack, the actors behind CryptXXX are rolling out patches and upgrades and attackers are shifting from Angler to Neutrino EK.
DDoS Get Started
Bring yourself up to speed with our introductory content
An application delivery controller (ADC) sits between you and the web server farm to manage the traffic between you and any number of back-end servers. In other words, app delivery controllers control the delivery of the web application to you -- hence the name.
Older ADCs required custom ASICs, which raised costs, but processing power has advanced so that ADCs with sophisticated functionality can be implemented in software and run on cost-effective general-purpose processors. This allows today's app delivery controllers to be implemented not only as standalone hardware devices but quite effectively as virtual appliances as well or as a hosted service. In other words, more companies than ever can afford an ADC.
This Buyer's Guide explains key developments in app delivery controller technology and reviews the features ADCs can have. It serves as a manual for networking professionals and others involved in acquiring an app delivery controller for their particular company.Continue Reading
Before implementing DDoS mitigation services, there are a few things enterprises should consider. Expert Ed Moyle discusses the steps to take to improve security. Continue Reading
Application delivery controllers have advanced in ways that make ADCs more useful for a wider range of companies than ever before. This guide outlines what you need to know about app delivery controllers in order to buy the best for your company. Continue Reading
Evaluate DDoS Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Learn from DNS provider NS1's experience with a DDoS attack. Expert Kevin Beaver has tips on developing a mitigation response for a DNS outage in your own enterprise. Continue Reading
Hackers don't just steal data; they can also crash applications with spam requests and traffic. Protect your cloud against DDoS attacks by employing these tools and techniques. Continue Reading
Before starting cloud penetration testing, there a few things to keep in mind. Expert Frank Siemons discusses limitations and techniques for pen testing cloud platforms. Continue Reading
Learn to apply best practices and optimize your operations.
An IPv6 DDoS attacks are imminent, and your network security tools may not be configured for it. Expert Michael Cobb explains how enterprises can prepare its defenses. Continue Reading
An anti-DDoS program requires solid understanding of the threat and a clearly thought-out strategy. This guide will help you launch your DDoS defenses. Continue Reading
There are many security risks for cloud-based gaming platforms. Expert Frank Siemons explains what's happened to gaming providers like Sony and Steam. Continue Reading
Problem Solve DDoS Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The types of DDoS attacks organizations face have grown and size of these attacks has increased. Expert Michael Cobb explains how to secure systems against common DDoS methods. Continue Reading
Cloud security providers protect enterprises from DDoS attacks, but attackers can still find the origin IP addresses. Expert Rob Shapland explains why that's a significant threat. Continue Reading
Our small colocation provider's other customers have been under DDoS attacks that affected our infrastructure. The colo null routes the bad IP address; meanwhile, our connectivity is poor. Continue Reading