August 22, 2017

The DDoS Education Series Part 4/4: The Overwhelming Scope of DNS Floods

The DDoS Education Series Part 4/4: The Overwhelming Scope of DNS Floods The first two instalments of this series covered TOS Floods and SYN Floods, while last […]
August 8, 2017

The DDoS Education Series Part 2/4. Are You SYN-fully Unprotected Against the Latest DDoS Threats?

Last time, we introduced DDoS attacks, and highlighted the threat of TOS Floods. This time, we turn our attention to SYN Floods. What are the risks […]
August 1, 2017

The DDoS Education Series Part 1/4: You’re Going to Need a Bigger Boat: Staying Afloat Against TOS Flood Attacks

Welcome to the first in a series of four blog posts that examine the most significant types of DDoS attacks, why they pose threats, how to […]
July 25, 2017

Making IoT Secure: A Holistic Approach

The IoT (Internet of Things) has changed the way we interact with machines of many kinds. It has influenced the way we live and work, and […]
July 13, 2017

Declawing the CopyCat Malware: Why and How?

Just as the Petya ransomware scheme was discovered and we managed to tackle it, we now face a new challenge to mobile security: CopyCat malware. How […]
July 11, 2017

From WannaCry to Petya. Are You Protected from the Latest Ransomware?

Ransomware-as-a-service has been identified as the next great cyber threat, and the stats indicate we’re already living the nightmare. Forbes reports that the growth is enormous, […]
October 26, 2016

ISPs Must Take the Wheel when Driving The IoT in Their Networks

From connected vehicles and vending machines to smart meters and wearables. The Internet of (connected) things (IoT) is promising to change our daily life as we know it, making it easier, better and more efficient. The recent massive Distributed Denial of Service (DDoS) attack, however, disrupted some of the most popular Internet services like Twitter and AirBnB. Carried out using an army of IoT botnets, the attack raised alarm bells with service providers. It proved that besides the smart and cool experiences IoT devices can deliver, there is a big security risk that cannot be overlooked.
March 30, 2016

DDoS Mitigation – Protecting Network Walls from Falling to Enemy Cyber Attacks

Many organizations, including financial institutions, gaming companies, telecom networks and other enterprises, experience DDoS attacks even though they are equipped with a Firewall and IPS. Ironically, during a DDoS attack these security functions are likely to become the weakest link of the entire network security.
March 23, 2016

About Cyber-attacks, Hacktivists, and Security Solutions

In the 21st century, cybercrime is rampant with hackers stealing and using data from individuals, companies and governments for their personal, financial or political gain. In particular, government agencies and large corporations are prime targets for organized hacker groups (“hacktivists”) such as Anonymous.
December 30, 2015

Two Top Trends for Service Providers to Watch (and Embrace) in 2016

The coming year will be an exciting one for Service Providers on many levels. In our previous blog posts, we already covered some trends that will […]
Open Popup
  • Why not subscribe to our blog?

    Click to receive our newest blog posts directly to your inbox.