IoT devices are everywhere and some businesses are only just starting to realise the security implications of so many unmanaged items on their network. The number of IoT devices is forecast to increase five fold to 75 billion devices by 2025. Couple the roll out of cellular IoT and faster 5G networks with vulnerable IoT devices, and you could be gifting hackers the ability to utilise compromised devices to launch DDoS attacks and/or deploy malware.more →
We all recognise that testing your IT infrastructure is paramount to keeping your systems secure, and we always discuss this with all of our customers. However, when we start to talk about DDoS testing we are often met with the view that conducting pen testing is enough. This lead me to write this blog explaining the two methods of testing, how they differ and where they fit in your network security arsenal.more →
This month we are sharing a blog from our partner Radware that takes a look at DDoS mitigation testing.
A couple of months ago, I was on a call with a company that was in the process of evaluating DDoS mitigation services to protect its data centers. This company runs mission critical applications and were looking for comprehensive coverage from various types of attacks, including volumetric, low and slow, encrypted floods, and application-layer attacks.more →
In the simplest terms hacking generally refers to unauthorised intrusion into a computer or a network. The person (or persons) engaged in hacking activities is known as a hacker. This hacker may alter system or security features to accomplish a goal that differs from its original purpose. There is a common misconception that your average hacker is a young person in a hoodie holed up in his parent’s basement.more →
DDoS (distributed denial of service) tests are a great way to identify any problems you may have in local or cloud-based mitigation. By simulating a real DDoS attack, you can see how malicious actors could infiltrate your systems and carry out a DDoS attack or perpetrate a data breach.
There are numerous different ways to launch a DDoS test;more →
In the previous article in this series, we looked at the business case for DDoS (Distributed Denial of Service) testing. If you read this last post, you will probably agree that there are a number of features of DDoS attacks and DDoS mitigation systems that make DDoS attack testing particularly important.more →
DDoS, or Distributed Denial of Service, creates a risk for businesses that conduct any transactions using public Internet services. The severity of the risk will, of course, depend on how much that business relies on its online systems for revenue. If the risk is sufficiently large, then budget is usually set aside for mitigation.more →
Large-scale DDoS (Distributed Denial of Service) botnet attacks are on the rise. Akamai, to take one recent example, has reported five attacks greater than 300 Gbps in the final few months of 2016.1 And it’s not all down to the latest cyber threat that’s keeping the security community awake at night: large-scale botnets built from everyday Internet of Things devices.more →