What Does a Windstorm in Wyoming Have to Do with Cyber Security?

Natural disasters serve as excellent examples of the unforeseen consequences that a cyber-attack against infrastructure will have. Take for example a strong windstorm in Wyoming in February 2017. The storm knocked down power lines, forcing water and sewage treatment plants to operate on backup generators, which weren’t available to some of the pumps that moved The post What Does a Windstorm in Wyoming Have to Do with Cyber Security? appeared first on Radware Blog.
Read more

Cyber Security Predictions

2016 was the Year of DDoS. 2017 was the Year of Ransom. Can we assess leading indicators of new attack techniques and motivations to predict what 2018 will bring? The answer is a resounding “yes.” We believe 2018 will be the Year of Automation—or, more precisely, big, bad attacks on automated technology processes. Here are The post Cyber Security Predictions appeared first on Radware Blog.
Read more

Pandora’s Box: Auditing for DDoS Vulnerabilities, Part II

The Rise of the “Availability Vulnerabilities” Availability problems aren’t necessarily unique; however, the testing is certainly different. This “availability security problem” is resulting in an increased risk to enterprises whose business models are tied to time (government elections, financial trading, online promotional retailers, insurance reconciliations, etc.). As a result, many organizations are asking themselves if The post Pandora’s Box: Auditing for DDoS Vulnerabilities, Part II appeared first on Radware Blog.
Read more

Pandora’s Box: Auditing for DDoS Vulnerabilities, Part I

THE BUSINESS PROBLEM: Your company has reason to believe that it may be attacked in the near future or recently has come under attack. The main questions that come to mind: – How do I know if the attackers will be successful? – How can I test my environment myself for expected attacks? THE TECHNICAL The post Pandora’s Box: Auditing for DDoS Vulnerabilities, Part I appeared first on Radware Blog.
Read more

2017’s 5 Most Dangerous DDoS Attacks & How to Mitigate Them (Part 2)

This is Part 2 of our series on the top 5 most dangerous DDoS attacks and how you can successfully mitigate them. To read Part 1 of the series, click here. Let’s dive back in with Attack Type #4: ATTACK TYPE #4: Fire & Forget: PDoS – Permanent Denial of Service A permanent denial-of-service (PDoS) The post 2017’s 5 Most Dangerous DDoS Attacks & How to Mitigate Them (Part 2) appeared first on Radware Blog.
Read more

2017’s 5 Most Dangerous DDoS Attacks & How to Mitigate Them (Part 1)

Throughout the history of mankind, whether in warfare or crime, the advantage has swung between offense and defense, with new technologies and innovative tactics displacing old doctrines and plans. For example, the defensive advantage of the Greek phalanx was eventually outmaneuvered by the Roman legion. Later, improvements in fortifications and armor led to castles and The post 2017’s 5 Most Dangerous DDoS Attacks & How to Mitigate Them (Part 1) appeared first on Radware Blog.
Read more