Sicurezza

Choosing the Right DDoS Solution – Part IV: Hybrid Protection

Pubblicato il

This is the last part of the blog series exploring the various alternatives for protection against DDoS attacks, and how to choose the optimal solution for you. The first part of this series covered premise-based hardware solutions, the second part discussed on-demand cloud solutions, and the third part covered always-on cloud solutions. This final piece […]

Sicurezza

Choosing the Right DDoS Solution – Part III: Always-On Cloud Service

Pubblicato il

This blog series dives into the different DDoS protection models, in order to help customers choose the optimal protection for their particular use-case. The first parts of this series covered premise-based appliances and on-demand cloud services. This installment will cover always-on cloud DDoS protection deployments, its advantages and drawbacks, and what use-cases are best for […]

Sicurezza

Choosing the Right DDoS Solution – Part II: On-Demand Cloud Service

Pubblicato il

This blog series explores the various options for DDoS protection and help organizations choose the optimal solution for themselves. The first part of this series covered the premise-based DDoS mitigation appliance. This installment will provide an overview of on-demand cloud-based solutions. Subsequent chapters will also cover always-on and hybrid solutions. Advantages of moving to the […]

Sicurezza

Cloud vs DDoS, the Seven Layers of Complexity

Pubblicato il

A question that I’ve encountered many times in the field of late is what are the impacts of DDoS attacks on cloud compute environments?  The primary benefit of cloud is that it elastically scales to meet variable demand, scale up instantly, scale down when demand subsides – in seconds…  So layman’s logic might say that […]

Sicurezza

You Need a New Approach to Stop Evasive Malware

Pubblicato il

Evasive malware has become a key threat to businesses’ sensitive data. Stealing and selling sensitive data on the Darknet is a lucrative business for hackers, who increasingly rely on evasive malware to penetrate corporate networks. A study by Verizon found that over 50% of data breaches involve the usage of malware in some capacity. Indeed, […]

Sicurezza

Marrying the Business Need With Technology Drive, Part Two: Security by Proxy or to Complicate

Pubblicato il

One of the biggest challenges we continue to see in the evolving cloud and DevOps world is around security and standards in general. The general lack of accumulated infrastructure knowledge coupled with the enthusiasm with which DevOps teams like to experiment is causing significant challenges for corporations in terms of standardization. This is leading to […]

Sicurezza

OneLogin hack exposed sensitive US customer data and ability to decrypt data

Pubblicato il

OneLogin, an identity management company which provides a single sign-on platform for logging into multiple apps and sites, was hacked. US customer data was potentially compromised,“including the ability to decrypt encrypted data.” The company, which claims “over 2000+ enterprise customers in 44 countries across the globe trust OneLogin,” announced the security incident on May 31. […]

Sicurezza

PureSec picks up investment because serverless is exciting

Pubblicato il

While in Israel late last year, I caught up with Shaked Zin and Avi Shulman, co-founders of security company PureSec. PureSec was in a bit of a conundrum. It was doing important work but in a space that was still nascent: serverless computing. As such, it was having a hard time both articulating its value […]