Was NATO Hit by a DNS Attack? The latest developments in the Russia-Ukraine cyberwar battle have garnered huge media attention. It was also recently revealed that the Werner Thalmeier |March 24, 2014
To Err Human, To Automate Secure "To err is human."This quote by British poet Alexander Pope gained new meaning to me after reading a follow-up article Motty Alon |March 20, 2014
Geopolitics and Cyber: A New War? This week, I was interview by Fox Business on how hacktivism takes center stage when geopolitical tensions rise. (Geopolitical Tensions Carl Herberger |March 17, 2014
Much more than Outage: 2013 DDoS Market Review What comes to mind when the term “Denial of Service” is mentioned? Probably website outage.This image has been crafted over Motty Alon |January 27, 2014
DDoSed by the Troll For a large number of online gamers that planned to spend their holiday break playing online games such as League Motty Alon |January 03, 2014
Moving to Mobile - The Changing Face of DDoS Like any data communication network, mobile networks contain a range of security threats. Though some threats are easy to identify Jon Garside |September 18, 2013
A Perfect Cyber Storm: September 11th, Black Friday and Other Enticing Dates for Cyber Attacks After reading this article and piecing through the motivations of the hactivist group illustrated in the story, I couldn’t help Carl Herberger |September 09, 2013
A Look Back at Black Hat: Staying True to its Roots, But Never the Same without Barnaby Jack Black Hat has come and gone again, the swag has been dispersed, the livers are recovering and delegates are returning Jon Garside |August 09, 2013
Distinguish between legitimate users and attackers – The secret sauce of DDoS protection Distributed Denial of Service (DDoS) is unique in the sense that these attacks actually consist of many legitimate individual requests. Ronen Kenig |June 18, 2013
Killer Apps or Apps that Kill? How the “Soft War” is replacing the Cold War in 2013 Last night, the Wall Street Journal ran a story around the Food and Drug Administration’s (FDA) warning to makers of Carl Herberger |June 14, 2013
Security Week Article: Next Generation Mobile Networks Come with Next Generation Security Threats This past weekend, Security Week ran a byline I wrote regarding Long Term Evolution (LTE).Although this brings the promise of Avi Chesla |June 11, 2013
Why Low & Slow DDoS Application Attacks are Difficult to Mitigate The naïve and still common perception of DoS/DDoS attacks is that to be destructive, attacks must use brute force and Ronen Kenig |June 10, 2013