-
Getting to the Heart of the Heartbleed Bug
Nearly two months has elapsed since the Heartbleed bug jolted the cyber community awake. Since then, media outlets have found plenty of other cyber news to adorn their pages: Thai authorities arrested and charged a hacker with stealing millions from Swiss banks The U.S. indicted five Chinese nationals with espionage The CEO of Cisco claims the…
-
Why Private Companies Should Take The NIST Cybersecurity Framework Seriously
Data in Cisco Systems 2014 Annual Security Report (PDF), shows the number of threat alerts has increased by about 14% year-over-year, since 2010. Cisco goes on to say DDoS attacks in 2014 are not only rising in number and length, but they’re also being used to mask other cyber activity such as fraud. Critical Infrastructure includes…
-
Is DDoS Illegal Or An Act Of Protest?
The legality of DDoS attacks has been argued both in the U.S. and abroad. Some say penalties are far too harsh, comparing DDoS attacks to peaceful protest. Others argue that these types of attacks are criminal and meant to disrupt and cause damage. Regardless of what side of the fence you stand, the reality…
-
How A DDOS Attack Can Send Your Website To A Screeching Halt
If you read the headlines with any regularity, chances are you’ve noticed how DDoS attacks tend to steal the show. Distributed denial of service wreaks havoc on businesses and websites around the world by stalling business and taking websites offline.
-
Complex DDoS Attacks Require An Intelligent Defense
Complex DDoS attacks are on the rise. The increase in these types of DDoS attacks has been on an upward trend over the last few years. Unfortunately, with 2014 around the corner, it doesn’t appear things will be any different in the coming year. Previously, I spoke about Layer 7 DDoS attacks and how application…
-
What Is A Layer 7 DDoS Attack?
To understand what a layer 7 DDoS attack is you must first understand what is meant by the application layer. For that matter it wouldn’t hurt to actually understand how they function and and what the hell this whole “layer” thing is. There isn’t much to do but to continue, so I suppose I should get…
-
How Does Remote DDoS Protection Work?
Remote DDoS protection is nothing new, but it may be a term you are not yet familiar with. The purpose of remote DDoS protection is to stop DDoS attacks from taking your site offline without having to change your hosting. DDoS attacks plague website owners, most notably businesses in the financial sector. However, they are…
-
4 Ways Vendor Risk Assessment Protects Your Enterprise
Vendors are a vital part of your business. They help to supply important resources and processes that enable you to serve your customers. When you have a good relationship with your vendors your company is able to reduce overhead, maximize profits, and maintain customer satisfaction. But even the best vendors need to be reviewed for…
-
Rapid Growth In Cloud Computing Predicted For Healthcare Industry
In the past, the healthcare industry has been slow to adopt new technologies but it is predicted that through 2017 cloud computing will begin to grow rapidly. With healthcare, there are often concerns about privacy and security that create a sense of hesitance when it comes to moving data offsite. These are the types of…
-
Top 100+ Cyber Security Blogs Sorted By Page Rank
We spend a lot of time monitoring the web. There is no denying that there are plenty of news sources and sites that offer information on cyber security. We’ve taken the time to pick through the top 100+ Cyber Security Blogs and sort them by PageRank. We will be adding new ranking factors as we continue…