Pandora’s Box: Auditing for DDoS Vulnerabilities, Part II

The Rise of the “Availability Vulnerabilities” Availability problems aren’t necessarily unique; however, the testing is certainly different. This “availability security problem” is resulting in an increased risk to enterprises whose business models are tied to time (government elections, financial trading, online promotional retailers, insurance reconciliations, etc.). As a result, many organizations are asking themselves if The post Pandora’s Box: Auditing for DDoS Vulnerabilities, Part II appeared first on Radware Blog.
Read more

Pandora’s Box: Auditing for DDoS Vulnerabilities, Part I

THE BUSINESS PROBLEM: Your company has reason to believe that it may be attacked in the near future or recently has come under attack. The main questions that come to mind: – How do I know if the attackers will be successful? – How can I test my environment myself for expected attacks? THE TECHNICAL The post Pandora’s Box: Auditing for DDoS Vulnerabilities, Part I appeared first on Radware Blog.
Read more

2017’s 5 Most Dangerous DDoS Attacks & How to Mitigate Them (Part 2)

This is Part 2 of our series on the top 5 most dangerous DDoS attacks and how you can successfully mitigate them. To read Part 1 of the series, click here. Let’s dive back in with Attack Type #4: ATTACK TYPE #4: Fire & Forget: PDoS – Permanent Denial of Service A permanent denial-of-service (PDoS) The post 2017’s 5 Most Dangerous DDoS Attacks & How to Mitigate Them (Part 2) appeared first on Radware Blog.
Read more

2017’s 5 Most Dangerous DDoS Attacks & How to Mitigate Them (Part 1)

Throughout the history of mankind, whether in warfare or crime, the advantage has swung between offense and defense, with new technologies and innovative tactics displacing old doctrines and plans. For example, the defensive advantage of the Greek phalanx was eventually outmaneuvered by the Roman legion. Later, improvements in fortifications and armor led to castles and The post 2017’s 5 Most Dangerous DDoS Attacks & How to Mitigate Them (Part 1) appeared first on Radware Blog.
Read more