The latest news, views and education about distributed-denial-of-service attacks. New, sophisticated DDoS attacks have increased throughout the world, and security experts predict this trend will continue. Use this DDoS Resource Center for the latest information on detection, mitigation, incident response and ongoing risk management.
Learn how the latest advances in privileged user monitoring can close windows of opportunity for attackers and keep business-critical data safe from credential theft, lateral attack movement, ransomware, and other threats.
Telecom company Voipfone has come under a severe "extortion-based" DDoS attack from foreign entities, according to a tweet by the U.K.-based company. The attack is likely a continuation of the one observed on Thursday, although the company stated that all its systems remained operational.
Microsoft disclosed that it mitigated a 2.4 Tbps DDoS attack, which was 140% higher in scale than any previously recorded network volumetric event on Azure. The firm and some security experts say that attacks of this magnitude could wreak havoc on targeted companies and are difficult to mitigate.
More than two-thirds of survey respondents say they take a balanced approach - business, customers and compliance - investing in fraud prevention technology. So, why do they also report customer friction among their top challenges? BioCatch's Raj Dasgupta analyzes the results of the new Fraud Transformation Survey.
Dr. Frances Undelikwo, divisional head of IT and operational risk management at Fidelity Bank in Nigeria, says she found her passion by trying out different departments and fields under information security. She discusses her career path and current role.
In this exclusive interview, Martin Cook, Senior Solutions Engineer with ReliaQuest, discusses how to reduce complexity, increase visibility and tap into new resources to enhance your own abilities to detect, investigate and respond to attacks.
Everyone knows the OWASP Top 10 lists of application security and API risks. But what about #11 and beyond - aren't those key priorities, too? Matt Tesauro of Noname Security talks about "Beyond the Top 10" and relates it back to mitigating the Log4j zero-day vulnerability.
Identity: In most instances it can be an asset. But occasionally, left improperly secured, it can be a roadblock for an enterprise. Wade Ellery of Radiant Logic explains the Identity Data Fabric and how it can help enterprises solve major business problems.