Why Hybrid Always-On Protection Is Your Best Bet

Users today want more. The ubiquity and convenience of online competition means that customers want everything better, faster, and cheaper. One key component of the user experience is service availability. Customers expect applications and online serv… Continue reading Why Hybrid Always-On Protection Is Your Best Bet

Telegram Hit by Powerful DDoS Attack – Blames China

Rich Irony – Secure Messaging App Neutralized by Cyber Attack We live in a world where foreign governments are routinely accused of cyber meddling to subvert democratic elections. Is anyone surprised that an authoritarian government is blamed for… Continue reading Telegram Hit by Powerful DDoS Attack – Blames China

Cloud WAAPs Are the Future of Application Security. But What Does That Mean?

Millions of Verizon FIOS broadband users vulnerable to hackers controlling and surveilling their home networks. Thousands of GPS watches whose maps were open to attackers tracking and eavesdropping on children and elderly users. A zero-day hole in Micr… Continue reading Cloud WAAPs Are the Future of Application Security. But What Does That Mean?

What Do Banks and Cybersecurity Have in Common? Everything.

New cyber-security threats require new solutions. New solutions require a project to implement them. The problems and solutions seem infinite while budgets remain bounded. Therefore, the challenge becomes how to identify the priority threats… Continue reading What Do Banks and Cybersecurity Have in Common? Everything.

Top 12 Allot Blogs of 2018

Top 12 Allot Blogs of 2018 With 2018 behind us, and 2019 picking up momentum, we thought you might be interested to see a list of the Top 12 Allot Blogs of 2018. We hope that you can find the time to read through this cyber compendium—you never k… Continue reading Top 12 Allot Blogs of 2018

Six ‘Lessons Learned’ For Mitigating DDoS Attacks

The world of DDoS is dynamic and evolving. So, when considering the most important features that a DDoS Mitigation should have, it’s always worth examining them in light of recent trends and applying some lessons learned. That, however, can be a … Continue reading Six ‘Lessons Learned’ For Mitigating DDoS Attacks

Hacker Who DDoSed Sony, EA and Steam Gaming Servers Pleads Guilty

A 23-year-old hacker from Utah pleaded guilty this week to launching a series of denial-of-service (DoS) attacks against multiple online services, websites, and online gaming companies between 2013 and 2014.

According to a Justice Department (DoJ) pre… Continue reading Hacker Who DDoSed Sony, EA and Steam Gaming Servers Pleads Guilty

Protecting Sensitive Data: A Black Swan Never Truly Sits Still

The black swan – a rare and unpredictable event notorious for its ability to completely change the tides of a situation. For cybersecurity, these nightmares can take the form of disabled critical services such as municipal electrical grids and o… Continue reading Protecting Sensitive Data: A Black Swan Never Truly Sits Still

DDoS Protection is the Foundation for Application, Site and Data Availability

When we think of DDoS protection, we often think about how to keep our website up and running. While searching for a security solution, you’ll find several options that are similar on the surface. The main difference is whether your organization… Continue reading DDoS Protection is the Foundation for Application, Site and Data Availability