Blog

Is Your Online Business Vulnerable to Bad Bots?

An ever-increasing amount of internet traffic is generated by non-human users. Increasingly, websites are facing large volumes of traffic caused by automated scripts, or bots. According to Incapsula’s 2016 report, 51.8% of web traffic was caused by bots – total bot traffic now exceeds total human traffic. All this traffic can be a significant drain on available bandwidth for websites, and cause issues for real customers trying to access your site.

more →

Blog

GDPR – Is Data Encryption Really Necessary?

Max Pritchard

It’s no secret that the proposed EU General Data Protection Regulation is technology-agnostic. It demands that companies implement proportionate, cost-effective controls to protect the personal data of EU residents, as well as enabling data subjects to exercise their rights over their own personal data. The only technology areas specifically mentioned in the regulation, currently, are pseudonymization and data encryption.

more →

Blog

Defending The App Eco-System: Developing A Modern WAF Strategy

Web and mobile application cyber-attacks are on the increase, with Forrester reporting that 40% of all security breaches are aimed at these services.[1] Even more worryingly, attacks specifically targeting secure Web services such as e-commerce are particularly on the rise, with Arbor Networks recently reporting “a massive increase over last year”.[2]

It is not surprising that cybercriminals are targeting web-based applications.

more →

Blog

DDoS Attack Simulation: Preparing For Large-Scale DDoS Attacks

Large-scale DDoS (Distributed Denial of Service) botnet attacks are on the rise. Akamai, to take one recent example, has reported five attacks greater than 300 Gbps in the final few months of 2016.1 And it’s not all down to the latest cyber threat that’s keeping the security community awake at night: large-scale botnets built from everyday Internet of Things devices.

more →

Blog

You really need to “DDoS test it”!

Mike Revell

I have seen it so many times before. DDoS (Distributed Denial of Service) tests are being commissioned simply to fulfil a “tick-box approach” to network security. Once purchased, those concerned move on to the next project. This is fine for most IT project deployments, but when it comes to maintaining effective DDoS mitigation, it is a different matter.

more →

Blog

An Invitation to Death from SIPVicious

It’s Halloween season. Not a fan, never have been. It seems to me the fancy dress and makeup are even more extreme than ever before and I’m not just talking about the Catholic priest or Jimmy Saville costumes; throats slit, disfigured faces, blood gushing from knife wounds, zombies, half living/half skeleton corpses are what I was confronted with the other night…….an invitation to death.

more →

Blog

“Look before you leap.” It’s a more secure approach to cloud adoption

Mike Revell

Last month, Amazon announced that its public cloud offering AWS generated $2.88 bn in revenue, up 58% on last year. The momentum of the adoption of public cloud services by business seems unstoppable. Amazon Web services (AWS), Microsoft Azure, Google, IBM Softlayers and others are growing rapidly by addressing an insatiable demand for very scalable server infrastructure.

more →