Protecting UK energy and utility companies from cyber and distributed denial of service (DDoS) attacks is a top priority for the government. Organizations responsible for critical national infrastructure have become a prime target for denial-of-service events; a DDoS attack is designed to overwhelm networks with bogus traffic and has the potential to cause massive utility outages and service disruption.more →
2018 was a busy year for retail in the cyber security arena, with many organizations suffering from data breaches during the year, including British Airways and Vision Direct.
British Airways suffered a sophisticated data breach affecting around
380,000 customers using its website and mobile app.
The attack –more →
Bots are everywhere and they need to be managed!
In this blog I am going to explore what Bot Management is, the benefits of having a bot management solution as well as provide a comparison between some of the top bot management products in the market for 2019.more →
IoT devices are everywhere and some businesses are only just starting to realise the security implications of so many unmanaged items on their network. The number of IoT devices is forecast to increase five fold to 75 billion devices by 2025. Couple the roll out of cellular IoT and faster 5G networks with vulnerable IoT devices, and you could be gifting hackers the ability to utilise compromised devices to launch DDoS attacks and/or deploy malware.more →
Financial services organizations are where the money is, and as such will always be prime targets for cybercrime. For many financial institutions, this bot traffic can account for more than half of their overall website traffic — covering both good bots engaged in essential business tasks to bad bots performing malicious activities.more →
This month we are sharing a blog from our security partner Oracle Dyn that takes a look at dealing with DDoS attacks.
If a DDoS attack hasn’t happened to your organization yet, odds are one will eventually. So it’s crucial to familiarize yourself with DDoS attack mitigation best practices.more →
In this blog I look at the additional value that can be gained by buying from a systems integrator (SI), as opposed to the manufacturer of a device, a piece of software or platform. I will answer the question:
Why would I want to buy from a systems integrator?more →
This month we are sharing a blog from our partner Radware that takes a look at DDoS mitigation testing.
A couple of months ago, I was on a call with a company that was in the process of evaluating DDoS mitigation services to protect its data centers. This company runs mission critical applications and were looking for comprehensive coverage from various types of attacks, including volumetric, low and slow, encrypted floods, and application-layer attacks.more →