We all recognise that testing your IT infrastructure is paramount to keeping your systems secure, and we always discuss this with all of our customers. However, when we start to talk about DDoS testing we are often met with the view that conducting pen testing is enough. This lead me to write this blog explaining the two methods of testing, how they differ and where they fit in your network security arsenal.more →
This month we are sharing a blog from our partner Radware that takes a look at DDoS mitigation testing.
A couple of months ago, I was on a call with a company that was in the process of evaluating DDoS mitigation services to protect its data centers. This company runs mission critical applications and were looking for comprehensive coverage from various types of attacks, including volumetric, low and slow, encrypted floods, and application-layer attacks.more →
In the simplest terms hacking generally refers to unauthorised intrusion into a computer or a network. The person (or persons) engaged in hacking activities is known as a hacker. This hacker may alter system or security features to accomplish a goal that differs from its original purpose. There is a common misconception that your average hacker is a young person in a hoodie holed up in his parent’s basement.more →
DDoS (distributed denial of service) tests are a great way to identify any problems you may have in local or cloud-based mitigation. By simulating a real DDoS attack, you can see how malicious actors could infiltrate your systems and carry out a DDoS attack or perpetrate a data breach.
There are numerous different ways to launch a DDoS test;more →
DDoS, or Distributed Denial of Service, creates a risk for businesses that conduct any transactions using public Internet services. The severity of the risk will, of course, depend on how much that business relies on its online systems for revenue. If the risk is sufficiently large, then budget is usually set aside for mitigation.more →
Large-scale DDoS (Distributed Denial of Service) botnet attacks are on the rise. Akamai, to take one recent example, has reported five attacks greater than 300 Gbps in the final few months of 2016.1 And it’s not all down to the latest cyber threat that’s keeping the security community awake at night: large-scale botnets built from everyday Internet of Things devices.more →
Turning to our predictions concerning the technical side of DDoS attacks in 2017, there was near unanimity over the escalating threat from insecure Internet of Things (IoT) devices. As we found at the tail end of 2016, large scale DDoS attacks are being facilitated by IoT botnets running the Mirai malware system (for example, the 21st October Dyn attack).more →
What does 2017 hold for Distributed Denial of Service (DDoS)?
Whilst we don’t possess a crystal ball at activereach® we do pride ourselves on keeping up with the latest thinking and, of course, we are in daily touch with our customers who are at the sharp end of this malicious form of cyberattack.more →