DDoS attacks launched by hacktivists are often viewed as little more than an interruption to online services. But Terry Ray of Imperva highlights a greater worry hidden behind these attacks.
Izz ad-Din al-Qassam Cyber Fighters' attacks on U.S. banks are back, and strikes waged July 31, without a doubt, prove it, says Akamai's Mike Smith. So why are security experts so puzzled by recent DDoS events?
Distributed-denial-of-service attacks are perfect weapons for cybercriminals and political adversaries, says Prolexic's Scott Hammack, who explains why any organization with an online presence should brace itself for attacks.
On average, 86 percent of web applications have at least one serious vulnerability, and each app is attacked about 4,000 times per year, says Imperva's Terry Ray. So, how must security be improved?
U.S. banking institutions are reluctant to acknowledge - much less discuss - ongoing DDoS attacks. But in recent regulatory statements, the nation's largest banks are candid about DDoS and its impact.
DDoS experts say three online game sites have been hit by Brobot, the massive botnet that since mid-September has been used by hacktivists to attack leading U.S. banks. What do these attacks signal?
When struck by DDoS, how - and what - should banking institutions communicate with their customers? Doug Johnson of the American Bankers Association advises on post-attack disclosure obligations.
Hacktivists have formally launched their third wave of distributed-denial-of-service attacks on U.S. banking institutions, and their botnet is growing. How should institutions prepare to defend?
Data security used to be about building firewalls and protections around the data. Now it's about securing the data itself. That's why data is the new perimeter, says Charlie Pulfer of Titus.
Next-generation threats require a next-generation firewall. Steve Pao of Barracuda Networks discusses his company's new firewall solution and the new levels of protections it offers.
Combining a network access control system with a mobile device management system is a good way to address security for BYOD, says Scott Gordon of ForeScout.
Security leaders know their old perimeter-based security models are insufficient. But what new model is best? And how can it reduce reliance on passwords for authentication? Julian Lovelock of HID Global offers insight.
Distributed-denial-of-service attacks are not new, but they are being taken more seriously as a threat to network security and data protection, especially by financial-services, says Ashley Stephenson of Corero Network Security.
Most organizations are challenged by having too much information in too many places. But Dieter Schuller of Radiant Logic says centralizing data can improve identity management.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.in, you agree to our use of cookies.