Almost every single computing device, laptop, desktop, router, firewall, keeps a record of things that have changed over time. Borrowing from maritime parlance, we call these “logs”. Logs are ledgers of changes in state, recorded and stored in sequence, and can tell you a lot about what that computing device has been doing, why it has been doing it, and when.more →
Bots are everywhere and they need to be managed!
In this blog I am going to explore what Bot Management is, the benefits of having a bot management solution as well as provide a comparison between some of the top bot management products in the market for 2019.more →
IoT devices are everywhere and some businesses are only just starting to realise the security implications of so many unmanaged items on their network. The number of IoT devices is forecast to increase five fold to 75 billion devices by 2025. Couple the roll out of cellular IoT and faster 5G networks with vulnerable IoT devices, and you could be gifting hackers the ability to utilise compromised devices to launch DDoS attacks and/or deploy malware.more →
We all recognise that testing your IT infrastructure is paramount to keeping your systems secure, and we always discuss this with all of our customers. However, when we start to talk about DDoS testing we are often met with the view that conducting pen testing is enough. This lead me to write this blog explaining the two methods of testing, how they differ and where they fit in your network security arsenal.more →
This month we are sharing a blog from our security partner Oracle Dyn that takes a look at dealing with DDoS attacks.
If a DDoS attack hasn’t happened to your organization yet, odds are one will eventually. So it’s crucial to familiarize yourself with DDoS attack mitigation best practices.more →
The OpenStack project was devised to help organizations build cloud-computing services leveraging standard hardware. Now it has become the largest open source initiative since Linux. Contributions are made by a huge community of architects and engineers as well as companies that have been providing code, applications, documentation, and usage feedback.more →
An ever-increasing amount of internet traffic is generated by non-human users. Increasingly, websites are facing large volumes of traffic caused by automated scripts, or bots. According to ‘Bad Bot Report 2019’ in 2018 37.9% of all internet traffic wasn’t human. All this traffic can be a significant drain on available bandwidth for websites, and cause issues for real customers trying to access your site.more →