DDoS attacks: know your enemy
- Details
- Published: Friday, 22 April 2016 07:29
Andreas Åsander looks at how knowing your attacker’s location is the latest weapon in the fight against DDoS attacks.
Andreas Åsander looks at how knowing your attacker’s location is the latest weapon in the fight against DDoS attacks.
Logicalis has prepared a list of ten questions which CIOs must have an answer for to ensure that their organization is adequately prepared for a cyber-incident. The questions offer a useful checklist for any information security planning activities
A new white paper by cybersecurity veteran Chris Pogue argues that the technology industry has been ‘fighting the wrong battle with the wrong weapons’ against cybercrime for the past two decades.
Cyber risk research carried out by YouGov on behalf of Noddle Protect amongst senior decision-makers in large businesses, has revealed that if businesses were to fall victim to a data breach, 57 percent say their biggest concern would be damage to their reputation
Jake Madders highlights the increasing trend for distributed denial of service attacks to come with a ransom demand and explains what organizations can do to handle such a situation.
Cloud-based security providers commonly use DNS redirection to protect customers' websites: however, computer scientists from KU Leuven, Belgium, and digital research centre iMinds have found that the protected IP address can be retrieved in more than 70 percent of cases.
New research published in the NTT 2016 Global Threat Intelligence Report reveals that cybercriminals have shifted their focus from traditional financial markets, to targeting the retail sector. Retail organizations experienced nearly three times as many cyberattacks as those in the finance sector
WinMagic, Inc. has released the results of a new study analysing the disconnect between end-user employees and IT managers, when it comes to information security.
The results of a survey conducted by Kaspersky Lab and B2B International show that a quarter of companies risk losing access to business-critical systems because there is no anti-DDoS protection in place.
The entire Continuity Central website is scanned daily by Sucuri to ensure that no malware exists within the site. This means that you can browse with complete confidence.
Business continuity can be defined as 'the processes, procedures, decisions and activities to ensure that an organization can continue to function through an operational interruption'. Read more about the basics of business continuity here.