5 Recipes For How to Design a Resilient Cyber-Attack Environment

1. Focus on availability-security Latency is a high focus for these folks.  Most just focus on confidentiality and integrity-based security models. All three aspects need to be focused on to ensure comprehensive security. 2. Understand the value & meaning of architecture as it relates to attacks Placement of technology devices in the environment is key Types […]

The post 5 Recipes For How to Design a Resilient Cyber-Attack Environment appeared first on Radware Blog.

Continue reading 5 Recipes For How to Design a Resilient Cyber-Attack Environment

Thoughts on Modern Day Password Management

Will we always be talking about Proper Password Management? In light of the recent compromises to Yahoo, I thought I would change gears a little from my normal blog focus and spend a moment on the topic of “what enterprises could be doing to better protect passwords from hackers.” Today, the password problem has changed […]

The post Thoughts on Modern Day Password Management appeared first on Radware Blog.

Continue reading Thoughts on Modern Day Password Management

What are the implications of the crackdown on popular DDoSaaS site VDoS?

The alleged creators of the popular VDoS website were arrested by Israeli authorities at the behest of the FBI on Thursday (September 8th). The 4-year-old site provided attack-for-hire services that helped its customers orchestrate more than 150,000 so-called distributed denial-of-service (DDoS) attacks designed to take websites offline, and earned approximately $300,000 per year. It is […]

The post What are the implications of the crackdown on popular DDoSaaS site VDoS? appeared first on Radware Blog.

Continue reading What are the implications of the crackdown on popular DDoSaaS site VDoS?

What are the implications of the crackdown on popular DDoSaaS site VDoS?

The alleged creators of the popular VDoS website were arrested by Israeli authorities at the behest of the FBI on Thursday (September 8th). The 4-year-old site provided attack-for-hire services that helped its customers orchestrate more than 150,000 so-called distributed denial-of-service (DDoS) attacks designed to take websites offline, and earned approximately $300,000 per year. It is […] Continue reading What are the implications of the crackdown on popular DDoSaaS site VDoS?

Newsrooms and Automation

Cyber-attacks and data breaches routinely make headlines in the largest publications and broadcasts in the world.  Millions have read and watched as news journalists explain exactly what had happened during the Proton Mail attack or the BBC hack. The access and manipulation that can happen when communication outlets are targeted is a very real and dangerous […] Continue reading Newsrooms and Automation

4 Reasons to Believe Future Cyber Attacks Will Terrorize

For years people have been talking about the threat of a Cyber Pearl Harbor or Digital September 11th event. There is a perception that this event would be an isolated incident that cripples society as we know it – heck, there is even a TV show about it. But what are the possibilities for such […] Continue reading 4 Reasons to Believe Future Cyber Attacks Will Terrorize

Dry Lighting Cracks against the Cloud: The Rise of the Advanced Persistent DoS (APDoS)

So, let’s say you are up to no good and motivated to attack somebody or some organization. After somewhat thoughtful considerations you decide you are going to launch a cyberattack to render your victim unavailable or to extort some sort of action or ransom. However, you have a big problem to solve – – how […] Continue reading Dry Lighting Cracks against the Cloud: The Rise of the Advanced Persistent DoS (APDoS)

Join me live on Facebook 6/13 to talk about privacy.

Get your questions ready! On June 13th, I’ll be back in the states and going live on Facebook to discuss some of your biggest questions about privacy in today’s cybersecurity landscape. So many businesses aren’t prepared to fight back and protect your data, so we’ll talk about what questions you should be asking to make […] Continue reading Join me live on Facebook 6/13 to talk about privacy.

At Risk for DDoS Outages? If You Answer Yes to the First Five Questions – WATCH OUT!

We’ve all seen executives boast after a high profile cyberattack outage that they have done all that they can do to prevent a DDoS or other type of cyberattack outage. They suggest that these attacks are inevitable and outages, ergo, are inevitable. However, is this true? Or are there flaws in the corporate structure of […] Continue reading At Risk for DDoS Outages? If You Answer Yes to the First Five Questions – WATCH OUT!