"it security" Articles
 

Press X to DDoS (part 1)

by Neustar Engineering April 19th, 2015

Every day millions of people play online video games. The tools of the trade are mostly familiar (controller, console, flat screen), but for some, they also include distributed denial-of-service (DDoS) attack tools to take their opponents offline or disrupt the platform itself. This is first in a two-part series on DDoS attacks on the gaming industry. This blog post is an overview of these attacks on the industry as a whole. Read Full Article

 

Why a CMO Is Attending the World’s Largest Security Event

by Lisa Joy Rosner April 16th, 2015

As a veteran CMO, I’ve been to my share of CMO- and marketing-focused conferences. But next week, I’ll be joining my colleagues at the world’s largest security event: RSA Conference 2015. While RSA is the premier event for the security industry, I think we’ll be seeing more and more CMOs at security events in the coming years. Read Full Article

 

Is DDoS Mitigation a Commodity?

by Bryant Rump April 07th, 2015

As DDoS attacks have increased in number, complexity, and impact over the last few years, so has the number of DDoS mitigation service providers—in fact, there are a lot of them. Is DDoS mitigation now a commodity? Read Full Article

 

DNS Hijacking and Phishing

by Raymond April 01st, 2015

Over the last few months, a number of high-profile companies have been hit by cyber attack, including Twitter, Lenovo, The New York Times, and The Huffington Post. In some cases, known hacker groups, such as the Syrian Electronic Army or Lizard Squad, used two well-known techniques to penetrate the victimized systems: DNS hijacking and phishing. But several solutions available on the market today could have prevented, halted, or minimized damage from the attacks. Read Full Article

 

EU DDoS Attacks: Increasing Investments, Evolving Strategies

by Nikitas Magel March 31st, 2015

Distributed Denial of Service (DDoS) attacks in the EU are becoming increasingly more frequent, expensive, and sophisticated. While that in itself may not be a big revelation, what is news is how forward-thinking companies have boosted their investments and enhanced their strategies to better defend against cyberattack. Read Full Article