A Look Back at Black Hat: Staying True to its Roots, But Never the Same without Barnaby Jack Black Hat has come and gone again, the swag has been dispersed, the livers are recovering and delegates are returning Jon Garside |August 09, 2013
Bots and Scripts for Abuse In the last few years, we’ve discovered that many of our customers have been putting up with artificial clients hitting David Hobbs |August 09, 2013
Killer Apps or Apps that Kill? How the “Soft War” is replacing the Cold War in 2013 Last night, the Wall Street Journal ran a story around the Food and Drug Administration’s (FDA) warning to makers of Carl Herberger |June 14, 2013
Security Week Article: Next Generation Mobile Networks Come with Next Generation Security Threats This past weekend, Security Week ran a byline I wrote regarding Long Term Evolution (LTE).Although this brings the promise of Avi Chesla |June 11, 2013
Why Low & Slow DDoS Application Attacks are Difficult to Mitigate The naïve and still common perception of DoS/DDoS attacks is that to be destructive, attacks must use brute force and Ronen Kenig |June 10, 2013
Can your firewall and IPS block DDoS attacks? More and more organizations realize that DDoS threats should receive higher priority in their security planning. However, many still believe Ronen Kenig |May 21, 2013
How Much Can a DDoS Attack Cost Your Business? Quite a lot, it seems. The Ponemon Institute study estimates that the average cost of one minute of downtime due Ronen Kenig |May 14, 2013
What It’s Like to Get Hit With a DDoS Attack – An Inside View It’s not always obvious to a network or system administrator that their company’s infrastructure is under attack. In fact, an Ronen Kenig |May 02, 2013
Pinpointing the Blame for Cyber Attacks – 3 Reasons Why it’s Harder than you Think As the cyber security landscape evolves and attacks become more sophisticated and malicious, the question of responsibility has grown increasingly Michael Atkinson |April 26, 2013
ERT ALERT: Cyber-attack Against U.S. Based Websites on May 7th – 4 Attack Methods to Expect AnonGhost – A hacking group affiliated with Anonymous announced a new cyber-attack campaign against US websites named #OPUSA. The attack Yaniv Balmas |April 19, 2013
DefenseFlow: The First Ever SDN Application That Programs Networks for DoS/DDoS Security Radware has announced its comprehensive SDN strategy and has introduced its first SDN Application: DefenseFlow™.Why is the DefenseFlow™ release so Ron Meyran |April 15, 2013
ERT Alert: Massive #OpIsrael Attack Set for April 7 According to a March 19th post on the Solidarite avec la Palestine Facebook page, multiple hacker groups are joining hands Eyal Benishti |April 02, 2013