How to prevent illness on your network – with the right medicine

The winter season is peak time for infection and disease across the UK.  But the old saying “prevention is better than cure“ is not only relevant to our personal health, but also to our networks and IT systems.

In corporate networks, the classic defence against malware and other external attacks is usually split-up between two solutions: a firewall and a traditional antivirus program....

Deflecting DDoS: Key tactics in the battle against IoT-powered attacks

What makes a DDoS successful? I asked myself that question at the end of August when the central bank of Spain, Banco d’Espana, was hit by a DDoS attack that took its website temporarily offline.

The bank issued a statement acknowledging the attack and stating that “no damage” had been done and its operations, as a central bank with no commercial arm, were not affected, implying that the attack was not successful. Meanwhile, the hacktivist group, Anonymous Catalonia,...

How to counter the increasing volume of DDoS attacks

As attacks are getting more sophisticated, so must our defences.

The threat to corporate networks from DDoS attacks has never been greater. Despite some wins of recent, such as the takedown in April of Webstresser – an online DDoS-as-a-service website, organisations cannot take their guard down.

Such a service meant that criminals could flood servers with traffic for as little as $18 per month. With no technical expertise, criminals were able to launch around four million...

For enterprise cyber defence, there should be more than one solution

Enterprises face a dilemma when it comes to defence against today’s modern DDoS attacks: do they trust the surgical precision of an on-premise DDoS protection solution or go with a DDoS cloud scrubbing solution? It’s a tough decision for IT managers to make, as whichever option chosen will be the companies way of protecting themselves from cyberattacks. But, why even choose between the two? 

When it comes to defending from cyberattacks, enterprises need all the help...

Dealing with insider threats and keeping your enterprise secure: A guide

There are many threats to enterprise cyber security with most coming from external threat actors. One of the most overlooked threats that companies are not safe from is insider threats. Security professionals are constantly being warned about insider threats and in A10 Networks AIR report earlier this year almost half (48 percent) of IT leaders say they agree or strongly agree that their employees do not care about its security practices. With companies aware of the issue, what are...

Why cryptocurrency is the newest DDoS battlefield

It is hard to pretend that cryptocurrency is still a niche fad. In January, James Altucher, entrepreneur and editor of the Altucher report, predicted to CNBC that cryptocurrencies will replace some or all paper money in the long run. He believes enterprises will eventually adopt the Bitcoin as the cryptocurrency begins to rise to prominence. And it’s not just finance and tech getting in on the cryptocurrency boom. Celebrities such as 50 Cent revealed recently that he had $7 million in...

Why IoT DDoS threats continue to loom in emerging new tech

There’s a flood of connected devices making their way into our homes and businesses – a deluge exacerbated by recent holiday gifts and the latest and greatest from CES, where connected devices always take top billing.

From mobile, wearables and car technology to advancements in smart homes, TVs and cameras, the tech world is awash with internet-connected devices. By 2020, it’s estimated that there will be more than 30 billion connected devices in the world...