Application Control and Traffic Shaping: key factors to consider

Application Control and Traffic Shaping: key factors to consider

If you’re like me, then you’ve been pretty busy lately coping with the new world in which we find ourselves. Regardless, the team and I have made some interesting observations, which I ...
SASE and QoE: What you need to know

SASE and QoE: What you need to know

Since Gartner introduced the Secure Access Service Edge (SASE) concept last year, we see growing interest about it among our partners and customers across the globe. However, quite a few people are ...
Inline DDoS Mitigation: Could the Massive Amazon AWS Attack Have Been Avoided?

Inline DDoS Mitigation: Could the Massive Amazon AWS Attack Have Been Avoided?

Terabit(s) per second DDoS attacks have not disappeared. Perhaps they were just taking a rest. AWS just reported a 2.3 Tbps attack earlier this year that tried to knock out cloud services ...
Data center management: best practices for attracting enterprise clients

Data center management: best practices for attracting enterprise clients

(written with Dan Bloom) Data centers are critical facilities that house computers, storage, and systems, which are all crucial for the daily operation of any modern business. There is currently a trend ...
Telegram Hit by Powerful DDoS Attack – Blames China

Telegram Hit by Powerful DDoS Attack – Blames China

Rich Irony – Secure Messaging App Neutralized by Cyber Attack We live in a world where foreign governments are routinely accused of cyber meddling to subvert democratic elections. Is anyone surprised that ...
Criminals Hacking CPUs to Mine Cryptocurrencies

Criminals Hacking CPUs to Mine Cryptocurrencies

Cryptocurrency Hijacking Cryptocurrency hijacking, or “cryptojacking” is one of the major threats faced by Enterprise IT teams today, and probably the most underestimated. Cryptojacking involves the covert, illegal use of targeted computing ...