Sicurezza

Out of the Shadows, Into the Network

Pubblicato il

Network security is a priority for every carrier worldwide. Investments in human resources and technology solutions to combat attacks are a significant part of carriers’ network operating budgets. The goal is to protect their networks by staying a few steps ahead of hackers. Currently, carriers may be confident that their network security solution is detecting […]

Sicurezza

Is It Legal to Evaluate a DDoS Mitigation Service?

Pubblicato il

A couple of months ago, I was on a call with a company that was in the process of evaluating DDoS mitigation services to protect its data centers. This company runs mission critical applications and were looking for comprehensive coverage from various types of attacks, including volumetric, low and slow, encrypted floods, and application-layer attacks. […]

Sicurezza

DDoS Protection Requires Looking Both Ways

Pubblicato il

Service availability is a key component of the user experience. Customers expect services to be constantly available and fast-responding, and any downtime can result in disappointed users, abandoned shopping carts, and lost customers. Consequently, DDoS attacks are increasing in complexity, size and duration. Radware’s 2018 Global Application and Network Security Report found that over the […]

Sicurezza

Security Pros and Perils of Serverless Architecture

Pubblicato il

Serverless architectures are revolutionizing the way organizations procure and use enterprise technology. This cloud computing model can drive cost-efficiencies, increase agility and enable organizations to focus on the essential aspects of software development. While serverless architecture offers some security advantages, trusting that a cloud provider has security fully covered can be risky. That’s why it’s […]

Sicurezza

Understanding the Darknet and Its Impact on Cybersecurity

Pubblicato il

The darknet is a very real concern for today’s businesses. In recent years, it has redefined the art of hacking and, in the process, dramatically expanded the threat landscape that organizations now face. So, what exactly is the darknet and why should you care? WHAT IS THE DARKNET? Not to be confused with the deep […]

Sicurezza

What Do Banks and Cybersecurity Have in Common? Everything.

Pubblicato il

New cyber-security threats require new solutions. New solutions require a project to implement them. The problems and solutions seem infinite while budgets remain bounded. Therefore, the challenge becomes how to identify the priority threats, select the solutions that deliver the best ROI and stretch dollars to maximize your organization’s protection. Consultants and industry analysts can help, but they […]

Sicurezza

The Rise in Cryptomining

Pubblicato il

There are four primary motivations for cyberattacks: crime, hacktivism, espionage and war. Setting aside nation-state sponsored groups, the largest faction of attackers are cybercriminals, individuals or well-established organizations looking to turn a profit. For the last several years, ransom-based cyberattacks and ransomware had been the financial modus operandi for hackers, but 2018 flipped the coin […]

Sicurezza

Top 3 Cyberattacks Targeting Proxy Servers

Pubblicato il

Today, many organizations are now realizing that DDoS defense is critical to maintaining an exceptional customer experience. Why? Because nothing diminishes load times or impacts the end user’s experience more than a cyberattack. As a facilitator of access to content and networks, proxy servers have become a focal point for those seeking to cause grief […]

Sicurezza

2018 In Review: Memcache and Drupalgeddon

Pubblicato il

Attackers don’t just utilize old, unpatched vulnerabilities, they also exploit recent disclosures at impressive rates. This year we witnessed two worldwide events that highlight the evolution and speed with which attackers will weaponize a vulnerability: Memcache and Druppalgeddon. Memcached DDoS Attacks In late February, Radware’s Threat Detection Network signaled an increase in activity on UDP port […]