What to Include in a Cybersecurity Disaster Recovery Plan

If the unthinkable were to happen to your business, what’s your disaster recovery plan? If bad actors were to inject ransomware into your system, what’s your process for a return to normal ...

2021 in Review, Part 4: 5 Cybersecurity Topics to Watch in 2022

One of the core principles of cybersecurity is not letting things “slip through the cracks”. An effective security posture depends on visibility. The more visibility you have into the environments where your ...
™

2021 in Review, Part 3: 5 Things Security Professionals Were Discussing this Year

Today, everyone is talking about CVE-2021-44228, and with good reason. But before that, here were five of the issues that dominated virtual “water cooler talk” in 2021: 5. Data security in the ...
Indusface AppTrana

DDoS Protection, Mitigation, and Defense: 8 Essential Tips

DDoS protection and mitigation services are of paramount importance today in any organization’s cybersecurity strategy. Over 10 million DDoS (Distributed Denial of Service) attacks occurred in 2020 with new attack vectors and. The post ...

New reforms will enhance the security and resilience of Australia’s critical infrastructure

Improving the security of critical infrastructure has become the focus of many governments around the world, including Australia. This is because a failure or disruption in one area of critical infrastructure can ...
Does Your DDoS Protection Solution Defend Against the Latest Attacks? 

Does Your DDoS Protection Solution Defend Against the Latest Attacks? 

Enterprises must ensure that vendors are capable of defending its network & applications from the latest DDoS burst and multi-vector attacks.  The post Does Your DDoS Protection Solution Defend Against the Latest Attacks?  appeared first on Radware Blog ...

With SLAs for DDoS Mitigation, the devil is in the details

When it comes to choosing the right DDoS protection there are many factors to consider including Network Capacity, Reliability, Service, Price and Time to Mitigation (TTM). In a recent survey, we asked ...
DDoS Attacks on VoIP Image 1

DDoS attacks on VoIP and the urgent need for DDoS protection

VoIP companies have recently been the target of a series of ransom Distributed Denial of Service (DDoS) attacks around the globe with UK-based VoIP providers including VoIP Unlimited, and Quebec-based company VoIP.ms ...
MTU and MSS Image 1

Learning how MTU and MSS work is key to using DDoS Protection as a Service

Maximum Transmit Unit (MTU) and Maximum Segment Size (MSS) are two important terms you should be familiar with when venturing into the world of networking, especially if you are working with GRE ...
Sharper DDoS 1

Shorter, sharper DDoS attacks are on the rise – and attackers are sidestepping traditional mitigation approaches

Imagine that your network is under attack. A couple of minutes ago, you detected a large burst of traffic, out of nowhere. Now it’s in excess of 60 Gbps, and overwhelming your ...