Giving Up On Security? How Security Companies Can Gain Trust Back Following recent escalation of cyber attack campaigns by the Anonymous group and most recently the pro-Palestinian “hacktivists” (Saudi Arabian hacker Avi Chesla |January 31, 2012
CDN Networks as a Weapon for DDoS Early in my career, I worked for CacheFlow (now BlueCoat). I spent a fair amount of time exploring proxy systems David Hobbs |January 27, 2012
5 Questions About Anonymous’ New DDoS Techniques In case anyone missed this news, Group Anonymous has put up code at pastehtml.com (a free and anonymous HTML code-hosting Carl Herberger |January 24, 2012
Lesson Learned: ISPs & CDNs aren’t enough for Anti-DDoS Well, I suppose that many in the Hacktivist world have resolved that 2012 would be a ‘breakout’ year for them Carl Herberger |January 18, 2012
The Risks of Using SaaS from a DDoS Perspective By David Hobbs – System Engineer at RadwareDavid Hobbs focuses on security everyday, with 16 years experience battling the latest Radware |December 20, 2011
Cyber Monday: A Hacktivist's Dream Come True? So far this year has been astonishing for the “Named Attacks” by Hacktivists as illustrated in the chart below. In Carl Herberger |November 02, 2011
6 Key 2012 IT Security Considerations By all indications 2011 will be known as a historic year in information security as threats added a whole new Carl Herberger |October 24, 2011
A Friend in Need is a Friend Indeed I just came back from a tour in Europe, meeting with both customers and journalists. It was a very interesting Sharon Trachtman |October 03, 2011
Fighting Cyber Attacks in Real Time with AMS Most organizations that utilize network defense software have adopted a passive approach when attempting to stop cyber attacks. That’s because Ron Meyran |September 19, 2011
Security? Defense, Offense, Both? Boy the world has gotten complicated to defend hasn't it? The old adage, "information security is very basic" turns out Carl Herberger |August 02, 2011
DoS Attack Forensic: Following Sherlock Holmes Footsteps Denial-of-Service (DoS) Attack forensics has several motivations. When under attack, this process is important to identify the attacker and safely Ziv Gadot |August 02, 2011