DDoS Attack Myth: Larger Cyber-Attacks Do More Damage “I just want to know that I’m safe from these 100Gbps plus attacks.”These are the words heard (or at least Ben Desjardins |November 11, 2015
The History of the Cloud, Part I – Server Load Balancing Isn’t it nice to know that when you are traveling, you have access to digital maps and precise location technologies Frank Yue |November 03, 2015
Can Low Cost “Always-On” DDoS Protection Keep You Safe? “You get what you pay for.” This is true for many areas in life and it also applies to IT Werner Thalmeier |November 02, 2015
The Cloud Path – Rerouting Traffic in Peacetime Solves some Cyber-Attack Risk, Creates Others Last month, I wrote about some inherent challenges with the increasingly popular cloud-only model for cyber-attack mitigation. As a reminder, Ben Desjardins |October 22, 2015
How Application Attacks Take Advantage of Holes in Legacy Network Security Solutions The attacks that get the most news coverage have dramatic names that make for compelling headlines. You can practically feel Louis Scialabba |September 16, 2015
The Internet has Upgraded to HTTP/2, but One Key Feature will Slow You Down Imagine a world where smartphones were only upgraded every 15 years. It is hard to imagine waiting that long for Frank Yue |August 26, 2015
5 Reasons Why Virtual Machine Security Could Become a Larger Threat The recent Venom Vulnerability has been open since 2004. The ShellShock Vulnerability released last year was open for 25 years! David Hobbs |June 10, 2015
Radware and Cisco Sign OEM Agreement As DDoS Mitigation Becomes a SP Imperative DDoS attacks are no longer just a nuisance and they can cause lasting damage. Organizations that ignore this threat often Ron Meyran |June 08, 2015
The Security Concerns of SSL/TLS Encrypted Traffic Secure Sockets Layer (SSL) and Transport Layer Security (TLS) sites are used today to secure transactions on banking sites, health Raj Vadi |March 30, 2015
LBaaS: Load Balancing for the Age of Cloud Jim Frey is Vice President of Research, Network Management for Enterprise Management Associates (EMA) and is a featured guest blogger.As Jim Frey |February 09, 2015