Blog

The activereach blog offers education and inspiration in #security and #connectivity. Our aim is to share vital knowledge with business professionals across all functions – so that they can understand the impact of emerging technology trends and gain insight into how these could be adopted in their organisations.

All content is our own, created by our salesteam, support engineers, tech consultants, and directors. We also pick the best of our technology partners’ blogs, re-published with their kind permission. Opinions expressed are the authors’ own. Comments gratefully received at marketing@activereach.net.

Blog

Is It Legal To Evaluate a DDos Mitigation Service?

This month we are sharing a blog from our partner Radware that takes a look at DDoS mitigation testing.

A couple of months ago, I was on a call with a company that was in the process of evaluating DDoS mitigation services to protect its data centers. This company runs mission critical applications and were looking for comprehensive coverage from various types of attacks, including volumetric, low and slow, encrypted floods, and application-layer attacks.

more →

Blog

Benefits of Open Networking and Software-Defined Storage

Sharon Holland

The OpenStack project was devised to help organizations build cloud-computing services leveraging standard hardware. Now it has become the largest open source initiative since Linux. Contributions are made by a huge community of architects and engineers as well as companies that have been providing code, applications, documentation, and usage feedback.

more →

Blog

What is the future of HTTPS?

Iain Westwood

With yet another data breach in the news, and the focus on digital security at the forefront of most people’s minds, I thought it would be a good time to review the history of HTTP, and the role it plays in current (and future) security measures.

A brief history of HTTP, SSL and TLS
It’s a safe bet that when Tim Berners-Lee was working on HTTP in the 1980’s, he couldn’t have anticipated the hand his new protocol would have in creating and shaping the digital world we all know today. 

more →

Blog

Is Your Online Business Vulnerable to Bad Bots?

An ever-increasing amount of internet traffic is generated by non-human users. Increasingly, websites are facing large volumes of traffic caused by automated scripts, or bots. According to ‘Bad Bot Report 2019’ in 2018 37.9% of all internet traffic wasn’t human. All this traffic can be a significant drain on available bandwidth for websites, and cause issues for real customers trying to access your site.

more →

Blog

Cyber Insurance: Risk vs Reward

Oliver Sears

Technology, social media and business transactions over the internet are key for the success of most organizations in terms of conducting day-to-day business and reaching out to prospective customers. As well as facilitating business they also serve as gateways to cyberattacks. Regardless of who launches them, these attacks can cause huge reputational and monetary damage.

more →