It only takes 6,000 smart phones to take down our Public Emergency Response System?

There are fewer scenarios which illustrate an evildoer’s heart than those designed for mass carnage. We are all familiar with the false alarm (human mistake) of the Public Emergency Broadcast system in Hawaii earlier this year, which wreaked hav… Continue reading It only takes 6,000 smart phones to take down our Public Emergency Response System?

2018: Snapshot of the Most Important Worldwide Cybersecurity Laws, Regulations, Directives and Standards

Are you out of breath from the breakneck pace of cyberattacks since the start of 2018? Throughout the world, nearly daily news reports have been filed detailing the results of incredibly effective cyberattacks ranging from small companies to nation-st… Continue reading 2018: Snapshot of the Most Important Worldwide Cybersecurity Laws, Regulations, Directives and Standards

New Threat Landscape Gives Birth to New Way of Handling Cyber Security

With the growing online availability of attack tools and services, the pool of possible attacks is larger than ever. Let’s face it, getting ready for the next cyber-attack is the new normal! This ‘readiness’ is a new organizational t… Continue reading New Threat Landscape Gives Birth to New Way of Handling Cyber Security

IT Can Be a Creepy Clown: Five Things That Keep Me Up At Night

If you are a security professional like me, you probably wind up speaking passionately about an attack vector, a cyber-incident or trends in information security from time-to-time. As such, you probably get approached to opine on a summary of what fri… Continue reading IT Can Be a Creepy Clown: Five Things That Keep Me Up At Night

What Does a Windstorm in Wyoming Have to Do with Cyber Security?

Natural disasters serve as excellent examples of the unforeseen consequences that a cyber-attack against infrastructure will have. Take for example a strong windstorm in Wyoming in February 2017. The storm knocked down power lines, forcing water and s… Continue reading What Does a Windstorm in Wyoming Have to Do with Cyber Security?

Cyber Security Predictions

2016 was the Year of DDoS. 2017 was the Year of Ransom. Can we assess leading indicators of new attack techniques and motivations to predict what 2018 will bring? The answer is a resounding “yes.” We believe 2018 will be the Year of Automa… Continue reading Cyber Security Predictions

Pandora’s Box: Auditing for DDoS Vulnerabilities, Part II

The Rise of the “Availability Vulnerabilities” Availability problems aren’t necessarily unique; however, the testing is certainly different. This “availability security problem” is resulting in an increased risk to enterprises whose business models are tied to time (government elections, financial trading, online promotional retailers, insurance reconciliations, etc.). As a result, many organizations are asking themselves if […]

The post Pandora’s Box: Auditing for DDoS Vulnerabilities, Part II appeared first on Radware Blog.

The post Pandora’s Box: Auditing for DDoS Vulnerabilities, Part II appeared first on Security Boulevard.

Continue reading Pandora’s Box: Auditing for DDoS Vulnerabilities, Part II

2017’s 5 Most Dangerous DDoS Attacks & How to Mitigate Them (Part 1)

Throughout the history of mankind, whether in warfare or crime, the advantage has swung between offense and defense, with new technologies and innovative tactics displacing old doctrines and plans. For example, the defensive advantage of the Greek phalanx was eventually outmaneuvered by the Roman legion. Later, improvements in fortifications and armor led to castles and […]

The post 2017’s 5 Most Dangerous DDoS Attacks & How to Mitigate Them (Part 1) appeared first on Radware Blog.

Continue reading 2017’s 5 Most Dangerous DDoS Attacks & How to Mitigate Them (Part 1)