Adopt TLS 1.3 - Kill Two Birds with One Stone Transport Layer Security (TLS) version 1.3 provides significant business benefits by making applications more secure, improving performance and reducing latency Prakash Sinha |September 13, 2018
2017’s 5 Most Dangerous DDoS Attacks & How to Mitigate Them (Part 2) This is Part 2 of our series on the top 5 most dangerous DDoS attacks and how you can successfully Carl Herberger |September 13, 2017
Defending Against the Mirai Botnet When attacks from the Mirai botnet hit the network in 2016, we all knew something was different. You could feel Ron Winward |September 12, 2018
2017’s 5 Most Dangerous DDoS Attacks & How to Mitigate Them (Part 1) Throughout the history of mankind, whether in warfare or crime, the advantage has swung between offense and defense, with new Carl Herberger |September 12, 2017
Don’t Leave Money On the Table – A Guide For Hosting Providers to Boost Revenue The hosting market is booming as more businesses look to third-party hosting providers to outsource much of the storage, delivery Amir Peles |September 12, 2012
Meet the Four Generations of Bots With the escalating race between bot developers and security experts - along with the increasing use of Javascript and HTML5 Radware |September 11, 2019
DDoS Protection is the Foundation for Application, Site and Data Availability When we think of DDoS protection, we often think about how to keep our website up and running. While searching Daniel Lakier |September 11, 2018
My Takeaways from This Year’s AT&T Cyber Security Conference Last week, I was invited to speak at the 16th annual AT&T Cyber Security Conference in NYC where over the Carl Herberger |September 11, 2014
HTTP/2 Will Break Your Security – Here’s How to Fix it Now that HTTP/2 is here and widely adopted by client browsers, many of the performance challenges that existed with HTTP1.1 Yaron Azerual |September 10, 2015
A Perfect Cyber Storm: September 11th, Black Friday and Other Enticing Dates for Cyber Attacks After reading this article and piecing through the motivations of the hactivist group illustrated in the story, I couldn’t help Carl Herberger |September 09, 2013
From Underestimating to Unplugging: Government Attitudes and Strategies on Cyber Security Many years ago when Distributed Denial of Service (DDoS) attacks were becoming a more common problem, I had a meeting Ben Desjardins |September 08, 2016
Beyond Free Calls -- Protecting Your Business from Phone System Fraud Denial of Service (DoS) has reigned as the most headline-grabbing network attack over the past three years. However, the truth Patrick McNeil |September 08, 2014