network threats

In my previous article, I raised a red flag about the diminishing practical returns of “mom and pop” threat research as a proxy for mitigating vulnerabilities and bad consequences. Threat assessment is often both difficult and incomplete, and sometimes best left to those who have timely access to the best possible data (and the even then, left to those with the military and intelligence means to act on it). In that piece, I also begged an obvious question. If chasing threats are not the best allocation of an organization’s... [Read More]
by RSS Phil Quade  |  Nov 09, 2017  |  Filed in: Industry Trends
All one has to do is take a look at the latest headlines to know that Distributed Denial of Service (DDoS) attacks are becoming increasingly commonplace in the enterprise environment. But that doesn't make them any less of a threat. In fact, quite the opposite. These days, powerful DDoS attacks have the ability to shut down dozens of servers, causing hours of lost service time, while damaging brands and costing victim companies millions in lost revenues. And many of these attacks now come equipped with stealth capabilities that can easily dodge... [Read More]
by RSS Stefanie Hoffman  |  Apr 10, 2014  |  Filed in:
In a recent post we explored the Myths about DDoS. Despite their infamy, many misconceptions surround the world of DDoS but now that you know the facts let's go one step further. Typical internet security appliances come prepackaged with signatures and rules that help identify attacks as simple as they come. This works in many cases but does not make any distinction between the attack traffic and legitimate users who are just trying to view your website. There is also the ever looming threat of zero-day attacks that signature based approaches are... [Read More]
by RSS Hemant Jain  |  Mar 21, 2014  |  Filed in:
Last month we explored the History of Distributed Denial of Service (DDoS) Attacks and how they have developed over time. DDoS attacks are one of the most fundamental and their use in disrupting services online has been unabated since the early 1970's. That being said, DDoS attacks are still one of the top threats to networks the world over, constantly adapting to new standards of protection and security. There are many different flavors of DDoS attack and almost as many misconceptions. Myth 1: It only happens to the other guy Most network and... [Read More]
by RSS Michael Perna  |  Mar 07, 2014  |  Filed in:
Machine-to-machine (M2M) communications applications are working their way beyond traditional utility, traffic control and telemedicine industries, as enterprises search for ways it can benefit their businesses despite some real risks. ZDNet's Tim Lohman recently penned an article about how the automated communication of data between connected devices, M2M, is envisioned more and more by CIOs as delivering real value, cost savings and innovation in management. Lohman says now that networking equipment (a simple SIM card or RFID chip, in the case... [Read More]
by RSS Stefanie Hoffman  |  Jul 30, 2012  |  Filed in: Industry Trends