"DDoS Protection" Articles

The Most Dangerous Season: Timing and Frequency of Multi-vector Attacks

Neustar Engineering
by Neustar Engineering March 1st, 2016
The Most Dangerous Season: Timing and Frequency of Multi-vector Attacks

During RSA Conference 2016, Neustar will preview some findings from our upcoming Security Operations Center (SOC) Report. The report chronicles attacks that the Neustar SOC team spotted and mitigated in 2015. As part of a three-part series covering different aspects of the SOC findings, this blog post discusses the timing and frequency of multi-vector attacks, a troubling trend on the rise. Read Full Article

Just Enough Is Good Enough: The Profile of Multi-vector Attacks

Neustar Engineering
by Neustar Engineering February 29th, 2016
Just Enough Is Good Enough: The Profile of Multi-vector Attacks

During RSA Conference 2016, Neustar will preview some findings from our upcoming Security Operations Center (SOC) Report. The report chronicles attacks that the Neustar SOC team spotted and mitigated in 2015. As part of a three-part series covering different aspects of the SOC findings, this blog post profiles multi-vector attacks, a troubling trend on the rise. Read Full Article

Opportunists in the Woodwork: Security Exploits on the Internet of Things

Neustar Engineering
by Neustar Engineering February 17th, 2016
Opportunists in the Woodwork: Security Exploits on the Internet of Things

It is estimated that there will be some 212 billion IoT devices by the year 2020. The unfortunate reality is that with every great technological shift, there will be new avenues for abuse, theft, and mischief. In fact, there are new exploits that are already impacting the Internet of Things and shaping the strategies of cyber attacks against it. Read Full Article

The Cyber Stickup

Travis Abercrombie
by Travis Abercrombie November 18th, 2015
The Cyber Stickup

The Wild West evokes images of Conestoga wagons, saloons, stick-up kids, and the inevitable quick-draw duel between cops and robbers. Fast forward three centuries, and that same struggle still plays out daily– but this time the uncharted territory is the Internet, and the stickup kids are hackers whose weapons of choice are distributed denial of service (DDoS) attacks. Read Full Article

Webinar: How to Reduce Risk When You Can’t Instantly Remediate “High” or “Critical” CVEs

Tomás Hernandez
by Tomás Hernandez November 13th, 2015
Webinar: How to Reduce Risk When You Can’t Instantly Remediate “High” or “Critical” CVEs

Common Vulnerabilities and Exposures (CVE) notifications provide full scale remediation recommendations, but only offer alternative risk reduction strategies where the full remediation has not yet been made available. On Thursday, November 19th at 1:00pm ET, Information Week/Dark Reading will host a Neustar-sponsored webinar to discuss recent high and critical CVEs. Join us to learn some reasonable, short-term steps that can be implemented to reduce the risk of exposure until a complete remediation can be executed. Read Full Article