Why Cyber Attackers are Still Defeating Your Network Security Nearly, two years ago I questioned the myth: does size really matter? and now it’s time to revisit the issue Ron Meyran |May 07, 2014
WordPress DDoS and other HTTP Reflectors Lately, there has been a lot of buzz about reflection and amplification attacks extending DDoS harm. The new kid on David Hobbs |March 25, 2014
Was NATO Hit by a DNS Attack? The latest developments in the Russia-Ukraine cyberwar battle have garnered huge media attention. It was also recently revealed that the Werner Thalmeier |March 24, 2014
To Err Human, To Automate Secure "To err is human."This quote by British poet Alexander Pope gained new meaning to me after reading a follow-up article Motty Alon |March 20, 2014
DDoSed by the Troll For a large number of online gamers that planned to spend their holiday break playing online games such as League Motty Alon |January 03, 2014
Personal Data – When the Invaluable Falls into the Wrong Hands Recently, the news has listed numerous egregious data thefts from large insurance companies as well as concerns of data security Carl Herberger |December 09, 2013
A Perfect Cyber Storm: September 11th, Black Friday and Other Enticing Dates for Cyber Attacks After reading this article and piecing through the motivations of the hactivist group illustrated in the story, I couldn’t help Carl Herberger |September 09, 2013
Distinguish between legitimate users and attackers – The secret sauce of DDoS protection Distributed Denial of Service (DDoS) is unique in the sense that these attacks actually consist of many legitimate individual requests. Ronen Kenig |June 18, 2013
Killer Apps or Apps that Kill? How the “Soft War” is replacing the Cold War in 2013 Last night, the Wall Street Journal ran a story around the Food and Drug Administration’s (FDA) warning to makers of Carl Herberger |June 14, 2013
Security Week Article: Next Generation Mobile Networks Come with Next Generation Security Threats This past weekend, Security Week ran a byline I wrote regarding Long Term Evolution (LTE).Although this brings the promise of Avi Chesla |June 11, 2013
Why Low & Slow DDoS Application Attacks are Difficult to Mitigate The naïve and still common perception of DoS/DDoS attacks is that to be destructive, attacks must use brute force and Ronen Kenig |June 10, 2013
ERT ALERT: Cyber-attack Against U.S. Based Websites on May 7th – 4 Attack Methods to Expect AnonGhost – A hacking group affiliated with Anonymous announced a new cyber-attack campaign against US websites named #OPUSA. The attack Yaniv Balmas |April 19, 2013