Biting the Hand that Feeds You: When IoT-Based Attacks Strike Service Providers

While we’re arming ourselves, our businesses and organizations against IoT-based attacks, few people talk about the damage they do to service providers. It’s something that gets overlooked, but the potential for causing detrimental impact is considerable. Service providers can suffer particularly badly because: They can be a target Attacks can originate from within their own…

Be the Cyber Knight in Shining Armor: Protect Your Subscribers From Cyber Bullies

As anonymized messaging apps top the download charts, their popularity raises the increasingly serious issue of cyberbullying.  Communication service providers, network owners and operators that are conscious of this issue can play a significant role in protecting vulnerable users and strengthen their position as more than just “pipe providers”. So how can you become the…

The DDoS Education Series Part 4/4: The Overwhelming Scope of DNS Floods

The DDoS Education Series Part 4/4: The Overwhelming Scope of DNS Floods The first two instalments of this series covered TOS Floods and SYN Floods, while last time, we focused our attention on Ping Floods. This final instalment in the education series looks at DNS Floods, what differentiates them from other kinds of DDoS attacks, and…

The DDoS Education Series Part 1/4: You’re Going to Need a Bigger Boat: Staying Afloat Against TOS Flood Attacks

Welcome to the first in a series of four blog posts that examine the most significant types of DDoS attacks, why they pose threats, how to identify them and how to mitigate them. In this blog post, we turn the spotlight on TOS Flood attacks. The threat of DDoS attacks is a growing one, with…

How Israel’s Tech Experience Can Protect “Smart Cities”

What can cities worldwide learn about urban network security from Israel’s technology and expertise? As civic infrastructure has become more connected and cities have become “smarter”, safeguarding urban security increasingly involves developing and applying cyber defense technology and the analysis of big data. And they need prevention and security technology to keep pace with a…

1 3 4 5