August 22, 2017

The DDoS Education Series Part 4/4: The Overwhelming Scope of DNS Floods

The DDoS Education Series Part 4/4: The Overwhelming Scope of DNS Floods The first two instalments of this series covered TOS Floods and SYN Floods, while last […]
August 15, 2017

The DDoS Education Series Part 3/4 : An Eye Opening Look at Blind and Targeted Ping Flood Attacks

In the first two parts of the series, we covered TOS floods and SYN floods. We’ve looked at what they are, what damage they can cause, and […]
August 8, 2017

The DDoS Education Series Part 2/4. Are You SYN-fully Unprotected Against the Latest DDoS Threats?

Last time, we introduced DDoS attacks, and highlighted the threat of TOS Floods. This time, we turn our attention to SYN Floods. What are the risks […]
July 19, 2017

How Israel’s Tech Experience Can Protect “Smart Cities”

What can cities worldwide learn about urban network security from Israel’s technology and expertise? As civic infrastructure has become more connected and cities have become “smarter”, […]
July 13, 2017

Declawing the CopyCat Malware: Why and How?

Just as the Petya ransomware scheme was discovered and we managed to tackle it, we now face a new challenge to mobile security: CopyCat malware. How […]
July 3, 2017

Why Your Firewall Needs a Multilayer Inline Solution for DDoS Protection

Deploying a multilayered inline solution stops your firewall from becoming the weakest link in your network security during massive DDoS attacks, and keeps critical network services […]
June 13, 2017

“Ignorance is Bliss” No Longer an Option When It Comes to Mobile Security for consumers

It is an accepted fact that, since the beginning of this decade, cyber-attacks on mobile devices have been growing rapidly, with no signs of slowing down. […]
Open Popup
  • Why not subscribe to our blog?

    Click to receive our newest blog posts directly to your inbox.