August 22, 2017

The DDoS Education Series Part 4/4: The Overwhelming Scope of DNS Floods

The DDoS Education Series Part 4/4: The Overwhelming Scope of DNS Floods The first two instalments of this series covered TOS Floods and SYN Floods, while last […]
August 15, 2017

The DDoS Education Series Part 3/4 : An Eye Opening Look at Blind and Targeted Ping Flood Attacks

In the first two parts of the series, we covered TOS floods and SYN floods. We’ve looked at what they are, what damage they can cause, and […]
August 8, 2017

The DDoS Education Series Part 2/4. Are You SYN-fully Unprotected Against the Latest DDoS Threats?

Last time, we introduced DDoS attacks, and highlighted the threat of TOS Floods. This time, we turn our attention to SYN Floods. What are the risks […]
August 1, 2017

The DDoS Education Series Part 1/4: You’re Going to Need a Bigger Boat: Staying Afloat Against TOS Flood Attacks

Welcome to the first in a series of four blog posts that examine the most significant types of DDoS attacks, why they pose threats, how to […]
July 19, 2017

How Israel’s Tech Experience Can Protect “Smart Cities”

What can cities worldwide learn about urban network security from Israel’s technology and expertise? As civic infrastructure has become more connected and cities have become “smarter”, […]
February 22, 2017

Why we protect our homes and not our mobile phones?

Among the many features consumers look for in a new smart phone is security, because people want a way to protect their digital assets stored on […]
February 13, 2017

Massive DDoS Attacks powered by Mirai IoT bots continue to spread into 2017

The Mirai botnet first got into the headlines last year following the massive DDoS attacks on Krebs and Dyn. The latter brought down parts of the […]
October 26, 2016

ISPs Must Take the Wheel when Driving The IoT in Their Networks

From connected vehicles and vending machines to smart meters and wearables. The Internet of (connected) things (IoT) is promising to change our daily life as we know it, making it easier, better and more efficient. The recent massive Distributed Denial of Service (DDoS) attack, however, disrupted some of the most popular Internet services like Twitter and AirBnB. Carried out using an army of IoT botnets, the attack raised alarm bells with service providers. It proved that besides the smart and cool experiences IoT devices can deliver, there is a big security risk that cannot be overlooked.
March 30, 2016

DDoS Mitigation – Protecting Network Walls from Falling to Enemy Cyber Attacks

Many organizations, including financial institutions, gaming companies, telecom networks and other enterprises, experience DDoS attacks even though they are equipped with a Firewall and IPS. Ironically, during a DDoS attack these security functions are likely to become the weakest link of the entire network security.
August 25, 2015

The Hidden Snag in Windows 10

As reported around the world, Microsoft’s launch of Windows 10 “did not break the Internet”. If we look at the bandwidth it consumed, it amounted to […]
Open Popup
  • Why not subscribe to our blog?

    Click to receive our newest blog posts directly to your inbox.