• Media Coverage

    Hackers wanted

    The U.S. Army ventured into unfamiliar territory last week, the first day of its “Hack the Army” bug bounty program that challenges dozens of invited hackers to infiltrate its computer networks and find vulnerabilities in select, public-facing Army websites.

    IoT and Ransom Denial of Service Attacks

    I was doing some research on IoT and DDoS attacks. As part of that research, I conducted an email interview with Carl Herberger, VP of Security Solutions at Radware. Rather than talk about DDoS attacks, Herberger told me about ransom denial of service (RDoS) attacks, a term I was unfamiliar with.

    NFV and SDN development, deployment and challenges

    Integration, orchestration and security noted by Radware as key challenges facing ongoing SDN, NFV and cloud deployment models.

    Top Recommendations to Ensure Performance for the IoT - Part 4

    The IoT is in position to become one of the greatest application performance management challenges faced by IT. APMdigest asked experts across the industry for their recommendations on how to ensure performance for IoT applications. Part 4, the final installment of the list, covering communication and the network.

    How hackers will exploit the Internet of Things in 2017

    The Internet of Things (IoT) is now a major force in the weaponization of DDoS. In 2016, IoT botnets have fueled a number of attacks, including the largest-ever DDoS attack, and that role will only grow in the coming years.

    Why the Department of Transportation’s self-driving car guidelines aren’t enough

    Ford, GM, Toyota and VW are just a handful of the car manufacturers planning to put self-driving cars on the road in the next five years. If you ask Uber or Tesla, they might say driverless cars have already arrived… which means we’re running out of time to secure one of the juiciest new targets for hackers.

    10 cybersecurity questions Trump and Clinton should answer

    The presidential candidates were too busy trading barbs in the debates rather than focusing on how to keep the cyber space safe.