Skip to main content Skip to search
Start Your Free Trial

A10 Networks Blog

Filters
    Topics
    Authors

    October 23, 2024

    The Need for Next-Generation Web Application Firewalls (WAFs) in Modern Threat Landscape

    In today's ever-evolving threat landscape, organizations face numerous security challenges that necessitate a shift from…

    October 8, 2024

    Meeting Growing Regulatory Requirements

    The Countdown to NIS2 is Upon Us The second Network and Information Systems Directive (NIS2)…

    September 24, 2024

    The Machine War Has Begun: Cybercriminals Leveraging AI in DDoS Attacks

    In the digital landscape, the integration of Artificial Intelligence (AI) into cybercriminal activities has marked…

    September 10, 2024

    BEAD – Are we there yet?

    The Broadband Equity, Access and Deployment program (BEAD) provides regional ISPs (RSPs) a once-in-a-generation opportunity…

    July 16, 2024

    The Importance of DDoS Threat Intelligence and Collaborative Data Sharing

    In today's interconnected digital landscape, distributed denial of service (DDoS) attacks pose a significant threat…

    July 10, 2024

    Approaches to Efficient Multi-layered DDoS Protection

    The landscape of DDoS attacks is constantly evolving. Gone are the days of simple bandwidth…

    July 9, 2024

    A Guide to Building Modern Approaches to DDoS Protection

    The digital world thrives on constant connectivity, making websites and online services the cornerstones of…

    June 10, 2024

    Securing Web Apps on a Lean Budget Amid Economic Uncertainty and Growing Data Breaches

    The cyber threat landscape is continuously evolving and becoming more dangerous with the rise of…

    June 6, 2024

    Vendor Disruption May Have You Rethinking Your App Delivery Investments

    ADC vendor landscape is experiencing a significant change as a result of acquisitions and shifting…

    May 8, 2024

    Global DDoS Weapons in 2024: Bots Run Wild

    What do you get when you bring soaring numbers of connected devices online around the…

    April 17, 2024

    Carpet-bombing Attacks Highlight the Need for Intelligent and Automated DDoS Protection

    Recently a large service provider in Eastern Europe contacted the A10 threat research team for…

    March 26, 2024

    The Imperative Need for Consolidation in Web App Security and Delivery

    In today's rapidly evolving digital and cyber landscape, securing and delivering applications efficiently is crucial…

    March 19, 2024

    A10 Defend Threat Control: DDoS Defense Reimagined

    An addition to the A10 Defend suite has arrived. A10 Defend Threat Control, a necessary…

    March 13, 2024

    Insight Into the DDoS Attacks on the French Government

    The attacks are ongoing as of this writing. Here are a few screenshots of data…

    December 12, 2023

    Regional ISPs Are Narrowing the Digital Divide—But Challenges Remain

    Federal and private funding, new market entrants, and creative problem-solving have made it possible to…

    November 7, 2023

    A10 Networks Simplifies Google Cloud Platform Cloud Deployments

    A10 Networks has expanded its robust application delivery controller (ADC) solution to Google Cloud Platform…

    October 30, 2023

    Latest Vulnerability Triggers Record-breaking DDoS Attacks

    A10 Defend Helps Customers Navigate this Rapidly Evolving DDoS Threat Landscape Distributed denial of service…

    October 24, 2023

    Protecting Systems from the New HTTP/2 Rapid Reset Vulnerability

    The A10 Networks threat research team has investigated the HTTP/2 rapid reset vulnerability (CVE-2023-44487), which…

    September 14, 2023

    The Role of AI in Modern Cybersecurity: Beyond the Buzz

    In today's world, and in particular, the cybersecurity landscape, the buzzword is undoubtedly "AI." We're…

    August 29, 2023

    Unlock Secure Hybrid Cloud Excellence: Building Digital Resiliency with Secure Application Delivery

    Are you ready to build digital resiliency with your secure application delivery in a hybrid…

    August 15, 2023

    Simplify and Secure Applications Across Clouds with the Latest, High-Performance Thunder ADC Images

    In today’s hybrid environments, delivering a consistent application experience across clouds, securely, and reliably has…

    August 10, 2023

    Importance of Securing and Simplifying DNS Infrastructure

    Domain Name System (DNS), informally referred to as the “phonebook of the internet,” is one…

    August 1, 2023

    Modernizing Application Delivery Infrastructure for Hybrid and Multicloud

    Author: Brad Casemore, Research VP, Datacenter and Multicloud Networks at IDC Application delivery infrastructure, such…

    June 29, 2023

    Energizing our Partners at Accelerate Affinity Partner Summit 2023

    In mid-May, we hosted over 100 partners from 23 countries in Antalya, Turkey at this…

    May 16, 2023

    Communication Service Providers Expect Strong Demand

    A10 Research Shows that Industry Optimism is a Driving Force for Investments, Reforms and Growth…

    April 24, 2023

    Fighting Cybercrime One Packet at a Time: A10 Next-Gen WAF, Powered by Fastly

    In today's digital landscape, layered defenses are crucial to protect against cyberattacks. Cybercriminals constantly evolve…

    April 17, 2023

    Understanding DDoS = Containing DDoS

    Distributed denial of service (DDoS), like many other cybersecurity buzz words, is a high-level common…

    April 6, 2023

    Simplify Your Cloud Deployments with A10 Networks in Microsoft Azure and AWS Marketplaces 

    The latest A10 Networks Thunder® Application Delivery Controller (ADC) images are now available in the…

    February 15, 2023

    A10 Networks Provides Update to Cybersecurity Incident

    On February 7, A10 Networks disclosed that it had experienced a cybersecurity incident on January…

    February 9, 2023

    Rural Broadband Buildouts Must Navigate the On-going Transition from IPv4

    Costs are Rising, Supply is Limited, and Demand is Urgent Regional internet service providers (ISPs)…

    January 18, 2023

    The A10 Networks Forest – Supporting Local Communities

    A10 Networks has been working with Treedom for the past year to help support local…

    January 11, 2023

    This Month in Ransomware: Hospitals and Patients Affected

    Ransomware Attack Wrap-up for December 2022 In December 2022 we saw ransomware cyberattacks on many…

    January 10, 2023

    Data Center Operators React to Threats with DDoS Mitigation

    For commercial data center operators, business is good—but clouds are gathering. On the positive side,…

    January 4, 2023

    Centralized TLS Decryption: The Prerequisite to SASE, SSE, Zero Trust

    Centralized TLS Decryption and the Elephant Inspection When an organization embarks on the arduous journey…

    December 27, 2022

    How to Defeat Emotet Malware with SSL Interception

    One of the longest-running and more lethal malware strains has once again returned on the…

    December 20, 2022

    2022 Ransomware Attacks and Evolution of Data Exfiltration

    Ransomware is one of the most sophisticated and feared attacks in the modern threat landscape.…

    December 15, 2022

    DOJ Charges Six for DDoS-for-hire Services, Kills 48 Sites

    The Websites Hosted “Booter” or “Stresser” Services On December 14th, the Department of Justice (DOJ)…

    December 12, 2022

    10 Data Breaches that Fuel CISO Nightmares

    The Chief Information Security Officer vs. Data Breaches These are challenging times for the chief…

    December 8, 2022

    The Cost of a Data Breach and the Need for SSL Security

    The cost of a data breach is soaring to unprecedented levels. According to IBM, the…

    December 4, 2022

    Systems Strike Ukraine with Amplification and DrDoS Attacks

    A10 Security Research Team Tracks DDoS Attacks By Paul Nicholson and Rich Groves The conflict…

    November 21, 2022

    DDoS Attack Prevention and DDoS Protection Best Practices

    Stopping Infrastructure Attacks and Application Attacks with DDoS Tools and Threat Intelligence Easy to launch…

    September 22, 2022

    Empowering the Next Generation with Ultra Education

    Ultra’s 2022 Winter Youth Business Fair Ensuring connectivity and working to bridge the digital divide…

    September 15, 2022

    Integrated Security for Telco Cloud Edge and Private 5G

    Telcos and enterprises are realizing the need to move toward the edge and deploy edge…

    August 9, 2022

    The Log4j Exploit and Botnets

    Of all the security issues that have appeared over the last few years, none has…

    July 7, 2022

    The Rise of Botnet and DDoS Attacks

    Distributed Denial of Service (DDoS) attacks have become an everyday or, some might argue, an…

    June 28, 2022

    Harmony Controller as-a-Service for Simpler Elastic Capacity

    Recent Enhancements with Release 5.4 Ease Multi-cloud Operational Complexity and Strengthen Security Network admins for…

    June 16, 2022

    Zero Trust, Cloud and Remote Working Drive Digital Resiliency

    Today’s enterprises have faced many challenges with the pace of change over the last few…

    June 1, 2022

    Top Cyber War Techniques and Technologies

    In our article Cyber Warfare: Nation State Sponsored Cyber Attacks, we discussed the nature of…

    May 17, 2022

    Cyber Warfare: Nation State Sponsored Cyber Attacks

    What is Cyber Warfare? The internet has changed how we view and interact with the…

    May 16, 2022

    A10 Networks is in Person in Las Vegas at Cisco Live 2022

    The A10 Networks team is returning to Cisco Live – in person – and looking…

    May 11, 2022

    The IPv4 Address Cost Rollercoaster

    A10 introduces five-year estimator to ease forecast uncertainty IPv4: High Demand, Uncertain Supply, Rising Costs…

    May 10, 2022

    A10 Networks is Back at the RSA Conference

    After a pandemic-induced hiatus, the A10 Networks team is heading back to the RSA Conference…

    May 4, 2022

    The Global State of DDoS Weapons

    In the past couple of years, the world has been battling the COVID-19 pandemic. As…

    April 21, 2022

    A10 Networks Forest – Helping Support a More Sustainable Future

    A10 Networks is committed to environmental conservancy and, among other initiatives, we have plans to…

    April 20, 2022

    C Spire Tackles Digital Divide with Industry Collaboration

    As the COVID-19 pandemic made all too clear, extending internet access to underserved areas isn’t…

    April 12, 2022

    DDoS Attacks and IPv6 Transition Impede Rural Broadband

    Rural broadband providers and other regional CSPs are playing a critical role in closing the…

    March 31, 2022

    Load Balancing Traffic to Applications in Kubernetes Cluster

    Kubernetes (also known as K8s), the container orchestration tool originally developed by Google, has fast…

    March 30, 2022

    Frost & Sullivan Recognizes A10 with Global DDoS Mitigation Customer Value Leadership Award

    Analysts at Frost & Sullivan cover the DDoS protection market and periodically award solutions based…

    March 21, 2022

    Easy Access to Cloud-Native Applications in Multi/Hybrid Cloud

    To stay ahead of competition, organizations are constantly looking for ways to drive innovation with…

    March 14, 2022

    Rural Broadband Initiatives to Fund Rural Internet Expansion

    The essential role of broadband connectivity in modern life—highlighted by the shift to virtual activities…

    March 2, 2022

    How Rural Broadband Carriers Are Closing the Digital Divide

    Closing the digital divide in underserved rural markets represents a clear challenge and opportunity for…

    February 10, 2022

    Cloud Application Delivery Insights: It’s Still a Work in Progress for Many

    For digital business, transformation, and resiliency, success depends on application performance. Organizations must deliver the…

    February 3, 2022

    Zero Trust Architecture: 5 Reasons You Need It

    Security in the Real World People living in small towns usually know all their neighbors…

    January 21, 2022

    Five Most Famous DDoS Attacks and Then Some

    Updated: May 30, 2024 Distributed denial of service (DDoS) attacks are now everyday occurrences. Whether…

    January 10, 2022

    Catch Up or Leap Forward: Bridging the Digital Divide

    Technology as a Catalyst for Shared Value As we commence 2022, the time is now…

    December 15, 2021

    Help Drive the Future of Innovation for Enterprise and Service Provider Customers

    A10 is Investing in its Engineering Team A10’s technology has been at the forefront of…

    December 13, 2021

    Closing the Digital Divide with Rural Broadband

    The estimated 42 million U.S. consumers who currently lack broadband internet service offer tremendous growth…

    December 6, 2021

    Intel Network Builders Awards Titanium Winner Circle to A10 Networks

    Intel Network Builders has announced the finalists in their annual Winners’ Circle and A10 was awarded…

    November 5, 2021

    A Closer Look at Zero Trust Cybersecurity Strategy Adoption

    As organizations seek to protect more open enterprise networks and more distributed workforces from ransomware,…

    November 2, 2021

    Introducing L3-7 DDoS Protection for Microsoft Azure Tenants

    DDoS attacks continue to grow in intensity, breadth and complexity as new threat vectors expand…

    November 1, 2021

    Twitch Hack, Data Exfiltration Shows Twitch Creator Payouts

    It's not an “if,” it’s a “when.” No matter what you do, no matter how…

    October 28, 2021

    Encrypted Traffic Inspection Lags as Malware Rises

    Ransomware, malware, and other forms of cyber-attacks continue to rise. Ransomware alone increased by 151…

    October 20, 2021

    The Gaming Industry’s Latest Challenge: DDoS Protection

    Like moths to a flame, hackers always go where the action is. As the COVID-19…

    October 13, 2021

    7 Strategies for CSO Cyber Security Survival

    Chief security officers (and CIOs, CISOs) have never had it so tough. Not only do…

    October 5, 2021

    The Facebook Outage Wasn’t a DDoS attack, but it Shines the Light on Digital Resilience Planning

    We were reminded that digital resilience is core to a successful online presence with yesterday’s…

    September 29, 2021

    Evaluating a TLS / SSL Decryption Solution

    Encryption is essential for data privacy—but it can also create security blind spots. The problem…

    September 28, 2021

    Rural Broadband Buildout: From Funding to Security and More

    Building a Future-ready Rural Broadband Infrastructure The push to extend broadband to underserved communities is…

    September 23, 2021

    Digital Resiliency Needs Modern Application Delivery

    IDC Technology Spotlight With digital transformation, many organizations had begun modernizing their application delivery solution…

    August 26, 2021

    Overcoming the Challenges of IPv4 Exhaustion

    As hundreds of regional communications service providers rush to deploy broadband and add thousands of…

    July 21, 2021

    DDoS Protection Major Concern for Middle East Service Providers

    2020 was a year that changed the world as we know it. The global pandemic…

    July 19, 2021

    5 Questions Before Delivering Your Applications to the Cloud

    The time has come for enterprises around the world to face the truth: the traditional…

    July 16, 2021

    COVID-19 Forces UK Communications Service Providers to Prioritize Cyber Security and Business Continuity

    The COVID-19 pandemic is somewhat of a paradox in the UK: the government was accused…

    July 12, 2021

    How are Communication Service Providers in Germany Dealing with a More Distributed Workforce

    COVID-19 has had a lasting impact on countries around the world and Germany is no…

    July 8, 2021

    Ransomware, Phishing, Zero Trust, and the New Normal of Cyber Security

    When the COVID-19 pandemic struck, cyber criminals saw their opportunity, and they took it. With…

    July 6, 2021

    NFL Greats, Tiki Barber, Nick Mangold and Joe Thomas, Join A10 and Partners for Pre-season Events

    Football fans are undoubtedly excited for the return of audiences to stadiums across the country…

    July 2, 2021

    Why French enterprises are unlikely to return to pre-pandemic working practices

    As COVID-19 engulfed the world, businesses and individuals rapidly shifted to remote working, relying more…

    June 30, 2021

    Malware Protection for Financial Services

    Adding Centralized, Dedicated TLS/SSL Inspection Makes the Zero Trust Model Work "…the financial services industry…

    June 29, 2021

    Majority of Indian Enterprises Accelerated Investment Around Cyber Security in 2020: A10 Networks Study

    2020 has been a challenging year for everyone, COVID-19 has turned everything upside-down and is…

    June 8, 2021

    Executive Order for Cyber-Attack Prevention Promotes Zero Trust Architecture

    After every election of the federal government, the new administration faces the same challenge: How…

    June 3, 2021

    Defeat Cryptojacking with Decryption and Inspection

    Investors, early adopters, and tech-savvy consumers aren’t the only ones interested in cryptocurrency these days.…

    May 31, 2021

    Simplifying Load Balancing in a Multi-cloud Environment

    With the average enterprise are leveraging almost five clouds on average,* load balancing isn’t getting…

    May 27, 2021

    Driving Digital Transformation with Effective Application Delivery and Security

    The Covid-19 pandemic underscored the importance of digital resiliency in the modern era. With 64…

    May 26, 2021

    How Zero Trust Could Have Stopped DarkSide’s Ransomware Malware

    If you live on the East Coast, you’ll definitely be aware by now that the…

    April 28, 2021

    Horizons 2021 A10 Affinity Global Partner Summit

    Expand Your Horizons Last year brought unprecedented challenges, but also tremendous opportunities for transformation. Our…

    April 15, 2021

    Communications Service Providers—Don’t Let IPv4 Exhaustion Stop Your Growth

    As rural broadband initiatives and digital divide programs like the FCC’s Rural Development Opportunity Fund…

    March 10, 2021

    Turner Industries Ensures Application Availability with Global Server Load Balancing

    Leading Industrial Construction Contractor Boosts Application Availability with A10 Networks Thunder® CFW Oil refineries, chemical…

    March 8, 2021

    A10 Networks launches Corporate Social Responsibility Initiative

    A10’s CSR Initiative Aims to Help Build a More Sustainable Future A10 Networks is launching…

    March 5, 2021

    A10 a Strong Performer in DDoS Mitigation Solutions Report, Q1 2021

    Evaluation from Q1 2021 by Independent Research Firm Identifies 11 Vendor DDoS Mitigation Solutions Forrester…

    March 4, 2021

    Hybrid Cloud and Multi-Cloud Polynimbus Policy Enforcement

    Enterprises are moving steadily to hybrid cloud and multi-cloud environments. For some, the goal is…

    March 2, 2021

    DevOps/SecOps Tools for Multi-cloud Application Service Automation

    Speed, agility, responsiveness, and quality of service are critical goals for enterprise networks. In pursuit…

    February 22, 2021

    Erlend Prestgard on Mobile Core Networks and Telco 5G Security

    In the “5G: Secure What Matters” blog post series, we showcase thought leaders and their…

    February 17, 2021

    PGA Golfer, Rickie Fowler, Joins A10 Networks for Virtual Event

    The PGA Tour Masters Tournament is back this April with limited spectator participation. What better…

    February 12, 2021

    Top 5G Core (5GC) and Mobile Network Predictions for 2021

    Contain your excitement …..5G is coming (again)! Wait….wasn’t 5G launched over two years ago? Well,…

    February 10, 2021

    In the Midst of COVID-19, We're Seeing a Pandemic of Cyber Attacks

    What's on the Horizon for 2021? 2020 sure has been an eventful year. As we…

    February 9, 2021

    The 5G Opportunity - from the Cyber Criminal’s Perspective

    The transition to 5G is almost too good to be true for cyber criminals. It…

    February 1, 2021

    Top Predictions in Service Provider Networks for 2021

    The Fanciful and Serious Predictions of Post-pandemic Impact 2020 has been a challenging year for…

    January 28, 2021

    Network Visibility, Event Monitoring and Alerting with Prometheus on A10 Thunder

    Networks today are becoming increasingly complex. Enterprises are migrating their workloads to the cloud as…

    January 27, 2021

    What 5G Core (5GC) Will Mean for Operators and What it’ll Look Like Getting There

    As anticipation builds for 5G, it might appear to the untrained eye that the new…

    January 25, 2021

    2020 Was a Busy Year for DDoS Attacks

    The latest State of DDoS Weapons Report Explores DDoS Weapons, DDoS Attacks and Malware Activity…

    January 20, 2021

    10 Predictions for Application Delivery in 2021

    We’ve become an application-centric society. We use apps to help us do our work, to…

    December 28, 2020

    OpenStack – Private Cloud with a New Purpose

    The OpenStack Foundation is now known as the Open Infrastructure Foundation. Apart from OpenStack, it…

    December 22, 2020

    The Implications of the SolarWinds Cyberattack

    Building a Zero-trust Framework for Security The cyberattack on SolarWinds that was announced last week…

    December 21, 2020

    Community Fibre Overcomes IPv4 Exhaustion with Network Address Translation

    London fiber-to-the-home provider to preserve IPv4 and fuel 10X customer growth Community Fibre has big…

    December 10, 2020

    Current State of DevOps in the Cloud-native Era

    DevOps and Cloud Cloud adoption has been on the rise regardless of the use private…

    December 9, 2020

    Multi-cloud and Cyber Security Dominate E-commerce IT

    Between rising business volumes, evolving multi-cloud architectures, and intensifying threats such as DDoS attacks, it’s…

    December 7, 2020

    Algis Akstinas on 5G connectivity, IoT and M2M

    In the “5G: Secure What Matters” blog post series, we showcase thought leaders and their…

    December 3, 2020

    MCTV Sustains Growth with Network Address Translation

    Family-owned regional broadband provider overcomes IPv4 exhaustion and delivers a great customer experience with CGNAT.…

    November 30, 2020

    Daniel Gueorguiev on 5G Security and the future of mobility

    In the “5G: Secure What Matters” blog post series, we showcase thought leaders and their…

    November 25, 2020

    Defending Enterprise Network Security: a DDoS Attack Primer

    A survey by Neustar indicated that more than 80 percent of financial services firms estimate…

    November 24, 2020

    Secure your Online Sales from Cybersecurity Threats during the Holiday Season

    The holiday shopping season is upon us. Typically, it begins around Black Friday, goes through…

    November 18, 2020

    Fast Detection Protects Critical MEC Services from DDoS Attacks

    Globally, DDoS attacks have increased 300 percent in 2020, spurred further by pandemic-inspired cyber crime. …

    November 17, 2020

    Despite IPv6 adoption, IPv4 Still Hangs in There - Maybe Forever

    IPv4 Exhaustion Continues but will Co-exist with IPv6 for Years to Come It’s been 22…

    November 16, 2020

    Kostas Katsaros on Edge Computing, IIoT and Mobile Networks

    In the “5G: Secure What Matters” blog post series, we showcase thought leaders and their…

    November 9, 2020

    aFleX Examples

    Updated: Nov 9, 2020 aFleX can address a large number of needs. Here are some…

    November 3, 2020

    Death by Ransomware: Poor Healthcare Cybersecurity

    If hackers attack your organization and you’re in an industry such as financial services, engineering,…

    November 2, 2020

    Ransomware Attacks Threaten Election Security - and Much More

    Computer Hackers Target Governments, Healthcare Systems, Educational Institutions and Corporations In an already unpredictable U.S.…

    October 27, 2020

    Building Security into the 5G DNA

    A10 Networks has been addressing 5G security challenges for mobile operators as they have launched…

    October 20, 2020

    Why are Government Agencies So Vulnerable to Hacking?

    In network security we talk about “attack surfaces,” the term for the total number of…

    October 19, 2020

    Hybrid Cloud Application Delivery in Financial Services

    Changing customer needs and preferences are driving the evolution of a new financial services industry.…

    October 6, 2020

    A10 Integrated with HashiCorp for Automated Application Delivery

    Multi-cloud Deployment is the New Norm It is a whole new world centered on the…

    September 14, 2020

    Ericsson Packet Core Firewall, Powered by A10 Networks, Meets Key Need for Cloud-native Security in 5G Networks

    COVID-19 has heightened existing operator and public awareness and fears of network vulnerabilities. Cyber criminals…

    September 2, 2020

    Dhrupad Trivedi Appointed as the Company’s Chairperson of the Board of Directors

    We are pleased to report, that effective September 1, 2020, the Board of Directors of…

    August 19, 2020

    Load Balancing Goes to School to Learn Application Availability

    Meeting the Challenges of K-12 Remote Learning Until recently, online technology was just one area…

    August 12, 2020

    Strengthening DNS Security with DNS over HTTPS (DoH)

    The Domain Name System (DNS) is critical to the functioning of the internet. The protocol…

    August 10, 2020

    When the Internet of Things (IoT) is Armed as an IoT Botnet

    Don’t Join the IoT Botnet Army When the Internet of Things (IoT) is weaponized to…

    August 6, 2020

    Threat Intelligence Report: DDoS Attacks Intensify in Q2 2020

    DDoS attacks continue to grow in size, frequency and sophistication. DDoS botnet weapons remain as…

    July 21, 2020

    A10 Launches Virtual Executive Briefing Center Experience

    Global Pandemic Requires Creative Approaches to Providing EBC Experiences for Customers and Prospects The COVID-19…

    July 15, 2020

    Mobile Operators Move Rapidly Toward 5G Deployments

    The first phase of 5G build-out is now well underway in major markets around the…

    July 13, 2020

    5G Deployment and Edge Computing Monetization Strategies

    The May 2020 edition of RCR Wireless News provides a comprehensive overview of the role…

    July 8, 2020

    Deployment Challenges in Multi-access Edge Computing (MEC)

    The edge is getting crowded, and mobile operators, cloud providers and enterprises are staking a…

    July 8, 2020

    NXNSAttack: A New DDoS Attack on Recursive DNS Resolvers

    The purpose of a Distributed Denial of Service or DDoS attack is to prevent an…

    July 6, 2020

    What's so bad about the NXNSAttack DNS Amplification Attack?

    How did NXNSAttack Against DNS Services get Noticed? In May 2020, the NXNSAttack was identified…

    July 2, 2020

    How do you Load Balance in a Hybrid or Multi-cloud World?

    As hybrid cloud and multi-cloud infrastructures become the norm, organizations need to ensure that traffic…

    June 29, 2020

    Here’s to a great Affinity Partner Virtual Summit 2020

    The Affinity Partner Virtual Summit was created to deliver an unmissable experience to our A10…

    June 24, 2020

    AWS hit by Largest Reported DDoS Attack of 2.3 Tbps

    Attack Shows it is Imperative for a DDoS Zero-Trust Approach and Continued Diligence We have…

    June 15, 2020

    DDoS Protection and DNS over HTTPS solutions win at Interop Tokyo

    Cybersecurity Solutions win Runner-up and Special Awards A10 Networks received a Runner-up Prize under the…

    June 12, 2020

    A10 Networks EMEA Affinity Partner Virtual Summit

    At A10 Networks, we are truly committed to the ongoing success of our partner channel…

    June 11, 2020

    Zero Trust Model is Meaningless Without TLS Inspection

    Protecting users against modern, invisible cyber threats A security strategy is only as strong as…

    June 5, 2020

    COVID-19: Zoom Calls, Eat, Sleep and Repeat

    If You Can, take a Minute to Help The global pandemic has changed the way…

    June 3, 2020

    Delivering DDoS Protection, HTTP/3 and QUIC Protocol Protection

    A10 Networks’ Thunder TPS Provides 1.2 Tbps Blocking Capacity with Machine Learning Fueled by massive…

    June 2, 2020

    TLS/SSL Decryption Essential for Strong Zero Trust Strategy

    Cyber security in the era of hyper connectivity at ET CISO Annual Virtual Summit 2020…

    May 19, 2020

    The Global Status of 5G Solutions and 5G Deployments

    In March, RCR Wireless News issued an in-depth overview of the state of 5G deployments…

    May 13, 2020

    Scale 4G & 5G Security Efficiently, as Mobile Traffic Surges

    Service providers, including fixed and mobile operators, are currently under pressure to supply unprecedented mobile…

    May 5, 2020

    A10 Networks Launches Technical Certification Programs

    Skills development and training is a life-long process, and we value the expertise our customers…

    May 4, 2020

    Benefits of Application Delivery for Multicloud Architectures

    There is no question that multicloud application deployments now play a foundational role in everything…

    April 23, 2020

    Meet short-term CGNAT Capacity Requirements as work-at-home Traffic Surges

    The global pandemic has pushed Internet traffic up 50 percent or more in some markets…

    April 1, 2020

    COVID-19 Pandemic Causes Massive Shift in Work Styles

    As the shelter-in-place orders spread across the country and around the world, it has placed…

    April 1, 2020

    Will COVID-19 Impact Adoption of 5G Security & IPv4 Exhaustion Solutions?

    A10 Networks employees have been under orders to “shelter in place” and nearly everyone is…

    April 1, 2020

    How to Prevent Cyber Attacks During the COVID-19 Pandemic

    COVID-19 Brings New Cyber Threats and Cyber Attacks Unless you were on a long desert…

    March 25, 2020

    Curing Healthcare Cyber Security - A Better Way To Protect Patient Data

    The Hippocratic Oath commands doctors to “first, do no harm.” Healthcare professionals have a proud…

    March 19, 2020

    Security in a Multicloud Environment

    Vigilance and Responsibility Required for Multicloud Secure Application Delivery As companies leverage a multicloud strategy…

    March 18, 2020

    What You Need to Know About DDoS Weapons Used in DDoS Attacks

    A DDoS attack can bring down almost any website or online service. The premise is…

    March 13, 2020

    A10 Networks Provides Update on Operations related to the COVID-19 Pandemic

    Since late January, A10 Networks has been monitoring the developments related to the spread of COVID-19…

    March 6, 2020

    Jim Brisimitzis on 5G, Edge Computing and AI

    In the “5G: Secure What Matters” blog post series, we showcase thought leaders and their…

    March 5, 2020

    Enabling DNS over HTTPS (DoH) with Thunder CFW

    Encryption is the foundation for securing data on the internet. Encrypted HTTP (HTTPS) has one…

    March 3, 2020

    Next-generation Application Delivery Controllers

    It’s No Longer About Load Balancing Capacity but Visibility and Actionable Telemetry Years ago, when…

    February 27, 2020

    McAfee and A10 Networks Secure the Network Edge Against Modern Attacks

    McAfee recently announced updates to their partnership program, particularly, the McAfee Security Innovation Alliance (SIA).…

    February 26, 2020

    5G Security Has Finally Arrived

    SK Telecom has achieved another “first” in 5G When SK Telecom announced its “5GX” in…

    February 20, 2020

    Automation that Matters and Eliminates “Fat Finger” Errors

    Operators consider network complexity to be the greatest threat for the next three years, according…

    February 11, 2020

    MWC Barcelona 2020: Best Practices for 5G Security

    Out of the utmost caution and concern for the well-being of our employees, partners and…

    February 11, 2020

    Will Lassalle on 5G Security, DDoS Attacks and Gaming

    Interview with Will Lassalle, CIO at JLS Technology In the “5G: Secure What Matters” blog…

    February 6, 2020

    Realizing the Full Value of the Multi-access Edge Compute (MEC)/5G Opportunity

    Multi-access edge compute (MEC) is emerging as a critical driver for growth in the 5G…

    February 5, 2020

    In the Super Bowl of 5G, Speed and Security Matter the Most

    The Super Bowl was a few days ago. It has become a global event with…

    January 31, 2020

    Managing Multi-cloud Chaos

    Survey reveals the paradox organizations have solving multi-cloud challenges As the race to the cloud…

    January 23, 2020

    Isaac Sacolick on 5G Networks, IoT and the Future of Mobility

    Interview with Isaac Sacolick, President, StarCIO In the “5G: Securing What Matters” blog post series,…

    December 23, 2019

    Why Roaming Still Matters in a 5G World

    5G changes a lot, but not everything. While 5G security is a big step forward,…

    December 20, 2019

    KubeCon + CloudNativeCon 2019 Takeaways

    Cloud Native Computing Foundation’s KubeCon + CloudNativeCon 2019 recently took place in San Diego, California.…

    December 19, 2019

    GTP Remains a 5G Security Threat as Operators Transition to 5G

    What is GPRS Tunneling Protocol (GTP)? GPRS Tunneling Protocol (GTP) is a 2.5G technology that…

    December 17, 2019

    In 2020: My Toothbrush Will Be Hacked

    In 2020, my toothbrush will be hacked. I’m sure it will happen. I will only…

    December 11, 2019

    For 2020: Ransomware Cyber Attacks are the Norm

    As we get close to the end of 2019, its time to have a look…

    December 9, 2019

    Boosting mobile revenue with 5G security-as-a-service

    The transition to 5G will bring many opportunities to mobile service providers but it will…

    December 2, 2019

    5G - The Transformation Generation

    5G is currently driving transformation on a global scale whether it is for an imminent…

    November 21, 2019

    Evolving Application Delivery for a Hybrid, Multi-cloud, Containerized World

    Hybrid cloud, multi-cloud, and container environments can help organizations increase business agility and compete more…

    November 14, 2019

    Looking Back at Microsoft Ignite: Managing Multi-cloud Environments

    A10 Networks exhibited at Microsoft Ignite the week of November 4 where Microsoft made a…

    November 14, 2019

    A Strong 5G Security Posture is Critical for IoT

    A recent article in TechRepublic mentioned that Kaspersky saw a 9x increase in cyber attacks…

    November 11, 2019

    AWS Route 53 DDoS Attack Shows You’re Responsible for Availability

    The recent AWS Route 53 DNS attack should make you consider who is responsible for…

    November 9, 2019

    SSL Decryption: Security Best Practices and Compliance

    Today, encryption has become ubiquitous — Google reports that as of June 1, 2019, 94…

    November 4, 2019

    Selecting the Best ADC Scale-out Solution for Your Environment

    Nowadays, with the massive amount of connected devices and dynamic business models, it is essential…

    October 17, 2019

    The Evolution of IoT with 5G: Future-proofing Current IoT Investment

    In my last few talks on 5G, I frequently got asked that given there are…

    October 3, 2019

    DDoS Attacks on Carrier Grade NAT Infrastructure

    A10 Networks has produced a series of videos in which company solutions architects explain a…

    October 2, 2019

    What are SYN Cookies and How are they Used?

    A10 Networks has produced a series of LightTalk videos in which company solutions architects explain…

    October 1, 2019

    A10 Networks and Aarna demonstrated interoperability at the 4th ETSI Plugtests

    A key benefit of the 4th European Telecommunications Standards Institute (ETSI) Plugtests held in June…

    September 30, 2019

    5G Security for Service Providers and More at Gitex Technology Week

    Join A10 Networks at 39th GITEX Technology Week 2019 – the biggest technology show in…

    September 26, 2019

    Advantages of Hybrid DDoS Cloud Over Pure Cloud

    A10 Networks has produced a series of videos in which company solutions architects explain a…

    September 25, 2019

    What are containers and why do we need them?

    A10 Networks has produced a series of LightTalk in which company solutions architects explain a…

    September 24, 2019

    Online Gaming Needs a Zero-Trust DDoS Defense

    New Rules of the Game: Only the Trusted May Enter DDoS attackers continue to innovate…

    September 18, 2019

    A10 Networks Enables Application Workloads in Oracle Cloud

    The application delivery controller (ADC) is in the critical path between the user and application.…

    September 17, 2019

    Insights Around the Journey to 5G

    Security remains a top concern of mobile operators as they make the journey to 5G.…

    September 16, 2019

    DDoS Scrubbing and Intelligent Automation Generates Profit

    In 2018, the GitHub DDoS attack made headlines with record-breaking traffic clocking in at 1.35…

    September 6, 2019

    NFV Integration at the ETSI Plugtest

    Third Year in a Row for A10 The ETSI Plugtest Report has just been released…

    September 5, 2019

    Yikes! Another DDoS Weapon, WS-Discovery Amplification Attacks

    Web Services Dynamic Discovery Services Weaponized for DDoS Reflected amplification attacks continue to be the…

    August 28, 2019

    Protecting the edge of 5G and Multi-cloud Networks

    MENA Information Security Conference addresses the unpresented security challenges associated with increased dependency on a…

    August 26, 2019

    A10 Networks Eases Application Delivery and Security in Oracle Cloud

    Earlier this year, we announced a partnership with Oracle to bring the A10 vThunder® ADC…

    August 23, 2019

    Applications in the Cloud: Best Practices for Delivery, Security and Visibility

    In environments that span from on-premises to public cloud, private cloud and hybrid clouds, application…

    August 15, 2019

    GTP and The Evolution of Roaming

    Mobile traffic using GPRS Tunneling Protocol (GTP) has exploded over the last couple years, largely…

    August 14, 2019

    The State of DDoS Weapons, Q2 2019

    A new version of the State of DDoS Weapons Report has been published. Learn more…

    August 13, 2019

    The Top 7 Requirements for Optimized Traffic Flow and Security in Kubernetes

    According to a 2018 survey from Portworx, four out of five enterprises are now running…

    August 12, 2019

    What Service Providers (and Enterprises) Need to Know About DDoS Scrubbing Services

    There are a number of considerations that service providers must make when implementing DDoS scrubbing…

    July 30, 2019

    Mayors of America, Beware! – Ransomware is coming to town

    Ransomware attacks have been around for a long time. We saw a huge spike in…

    July 29, 2019

    Beat Gaming Cheaters and DDoS Spoilers with Real-time Packet Watermarking

    Gaming, for entertainment or gambling, seems to bring out the worst in the worst people.…

    July 24, 2019

    How Zones Facilitate a Proactive DDoS Defense that Protects Real Users

    The primary objective of DDoS protection is to ensure availability of services to legitimate users.…

    July 23, 2019

    Multi-cloud and Cloud-native Applications Drive Need for ADC Transformation

    Organizations are increasingly adopting hybrid IT and embracing multi-cloud environments, and they are doing so…

    July 22, 2019

    5G is About to Change the World. Here’s How it Works

    5G at a Glance Several aspects of 5G technology allow mobile operators to create a…

    July 18, 2019

    New Approaches to DDoS Protection Offer Better Security and Economic Scale

    Distributed denial of service (DDoS) attacks are only going to increase over time and attackers…

    July 17, 2019

    TLS 1.3 - Status, Concerns & Impact

    It is common knowledge that in August, 2018, Transport Layer Security (TLS) Protocol Version 1.3…

    July 16, 2019

    Enforcing GDPR - A New Era of Accountability and Fines

    In September 2018, British Airways announced that a data breach had occurred on their website…

    July 15, 2019

    Remember Roaming? Let Your Subscribers Roam Securely

    When subscribers avoided using roaming, security of the roaming wasn’t that important. Now the environment…

    July 15, 2019

    GTP Security - Essential for 4G and Evolving 5G Networks

    5G promises higher speeds, lower latency, a multitude of new IoT applications and, for the…

    June 25, 2019

    A10 & Dell EMC Partner to Deliver 5G Security, Multi-cloud Solutions

    The market opportunity around 5G security and multi-cloud is expanding rapidly. A10 Networks is providing…

    June 24, 2019

    This Is How Much Time and Money a DDoS Attack Will Cost You

    This Is How Much Time and Money a DDoS Attack Will Cost You You don’t…

    June 19, 2019

    The Urgency of Network Security in the Shared LTE/5G Era

    Is mobile network security really that urgent? Well….yes! The 5G non-standalone (NSA) models defined by…

    June 12, 2019

    How to Deploy the A10 Networks Secure Service Mesh in Red Hat OpenShift

    What is Red Hat OpenShift? Red Hat OpenShift is a comprehensive enterprise-grade platform built for…

    June 6, 2019

    Top Seven DDoS Protection Challenges

    Although there are now more DDoS protection solutions available than ever before, companies still tend…

    June 5, 2019

    AI-driven Application Security Solutions for Multicloud Environments

    Cisco Live US 2019 is themed “You Make Possible.” Stop by A10 Networks to see…

    June 4, 2019

    Time for Zero-day DDoS Defense

    A10 Networks entered the DDoS defense market in 2014 by shattering the industry standard for…

    June 3, 2019

    The Bumpy Road to 5G – A Secure Gi-LAN can Help

    5G promises higher speeds, lower network latency, a multitude of new IoT applications and, for…

    May 30, 2019

    5G: The Slope of Enlightenment

    Upon completing my first quarter with A10 Networks, I looked back to assess the last…

    May 30, 2019

    Why DDoS Attackers Love Companies with Multiple Data Centers

    In the eyes of DDoS attackers, the more data centers a company has, the more…

    May 28, 2019

    A10 Networks Demonstrates AI-driven Network & Application Security at the Gartner Summit 2019

    This year’s Gartner Security and Risk Management Summit is themed “Making Security and Risk Matter…

    May 23, 2019

    Why Half of Companies Are Raising Their DDoS Defense Budgets

    DDoS attacks are only becoming more destructive, and companies know it: That’s why one-half (49…

    May 8, 2019

    See A10 Networks’ AI-Driven Network & Application Security Solutions

    Find everything you need for best-in-class security solutions at Infosecurity Europe. Visit A10 Networks to…

    May 8, 2019

    DDoS Attacks Against CSPs: What You Need to Know

    We've all seen the news stories detailing DDoS attacks against banks, consumer retailers and media…

    May 6, 2019

    Advanced 5G Security Is Fundamental to 5G Success

    5G Security was very top-of-mind at this year’s MWC Barcelona, as I discussed in my…

    May 1, 2019

    Secure Application Delivery for Hyper-Converged Infrastructures

    Today, every organization is undergoing digital transformation. Digital transformation will enable organizations of all sizes…

    April 24, 2019

    Three Ways to Block DDoS Attacks

    In our previous post in this series, we discussed how automation can save you invaluable…

    April 22, 2019

    Three Reasons You Need DDoS Weapons Intelligence

    In our previous article in this series on DDoS fundamentals, we discussed ways in which…

    April 17, 2019

    Five Ways Automation Puts Time on Your Side During a DDoS Attack

    DDoS attacks can be catastrophic, but the right knowledge and tactics can drastically improve your…

    April 16, 2019

    Multi-cloud? No worries - with Secure Application Delivery from A10 Networks

    Join A10 Networks at Nutanix .NEXT 2019 — the data center and cloud conference where…

    April 15, 2019

    Unmatched Hyperscale 5G Security for the Core and Mobile Edge

    A10 Networks at the BIG 5G Event May 7 - 8 - Colorado Convention Center,…

    April 15, 2019

    New Solutions for Building Resilience and Defending Networks at TechNet Cyber 2019

    The cyberspace battlefield has changed. It’s no longer a place where perpetrators merely launch one-off…

    April 8, 2019

    Addressing Security for 5G Cloud Radio Access Networks

    Small cells have been around for a little more than a decade and they will…

    March 29, 2019

    Microsoft Office 365 Enterprise Network Architecture

    This article presents a high-level overview of the Office 365 network infrastructure from end-user clients…

    March 27, 2019

    5G Key Technologies

    This article provides an overview of several of the most important new technologies developed for…

    March 27, 2019

    5G Energy Efficiency Explained

    This article describes the various 5G technologies and architectures that are being deployed to increase…

    March 27, 2019

    5G Network Reliability Explained

    This article describes the 5G network architecture and underlying technologies deployed by mobile network carriers…

    March 27, 2019

    Customers Come First and Add Value to A10 Networks' Products and Solutions

    A10 Networks, engaging with our customers not only help them with their business goals, but…

    March 21, 2019

    F5's Acquisition of NGINX: Close but not Quite

    Many of our customers might be asking if F5's acquisition of NGINX will have an…

    March 14, 2019

    How the 5G Telco Market is Transforming with Lessons Learned from the Enterprise

    Over the past six months, more people in the general populace have begun using the…

    March 12, 2019

    Impressions from MWC Barcelona: 5G is FINALLY here and Security is a Top Concern

    After almost five years of talk, 5G is finally arriving. I had an opportunity to…

    March 6, 2019

    Importance of Gi-LAN functions consolidation in the 5G world

    Today's LTE and 4G networks have been playing an important role in supporting mobile broadband…

    March 5, 2019

    Ludicrous Performance for Software SSL

    There are many recognized benefits to moving more network functions from hardware to software, including…

    March 1, 2019

    IoT and DDoS Attacks: A Match Made in Heaven

    By 2020, Gartner predicts the total number of IoT devices will reach 20.4 billion. At…

    February 25, 2019

    Look Who’s Talking! Security Experts Share Their Views at A10 Networks RSAC 2019

    See A10 Networks’ New AI-Driven Network & Application Security Solutions RSAC 2019 -- Booth #S1653…

    February 21, 2019

    Top 10 Corporate Cybersecurity Conversations for 2019

    See A10 Networks’ New AI-Driven Network & Application Security Solutions RSAC 2019 -- Booth #S1653…

    February 19, 2019

    The State of DDoS Attacks: The Best Offense is a Strong Defense

    A new version of the State of DDoS Weapons Report has been published. Learn more…

    February 13, 2019

    A10 Networks Partners with Lenovo to Accelerate Service Provider Transition to 5G Networks

    5G is the latest emerging standard in cellular mobile communications and it will eventually replace…

    February 12, 2019

    Automate Your Cyber Defenses for 5G & Multi-Cloud

    See A10 Networks’ New AI-Driven Network & Application Security Solutions • RSAC 2019 • Booth…

    February 5, 2019

    Faster, More Affordable Than Citrix & F5 ADC SSL Offloading

    Traditionally, if you were looking for Application Delivery Controller (ADC) and server load balancing SSL…

    January 24, 2019

    Sharpening the Competitive Edge: Are We Ready to Compete, Deter, and Win Globally?

    AFCEA WEST 2019 Visit A10 Networks in Booth 720 • San Diego, Feb. 13 -…

    January 21, 2019

    The State of DDoS Weapons, Q1 2019

    A new version of the State of DDoS Weapons Report has been published. Learn more…

    January 14, 2019

    Highlighting Machine Learning and AI in Cybersecurity at RMCS 2019

    At this year's Rocky Mountain Cybersecurity Symposium industry and DoD experts will delve into machine…

    December 30, 2018

    Gi LAN Functions in 5G

    LTE and 4G network have been playing an important role to support mobile broadband services…

    December 28, 2018

    5G and the Evolution of Mobile Networks

    “5G is the fifth generation of cellular mobile communications. It succeeds the 4G, 3G and…

    December 28, 2018

    2019 Predictions and the Start of 5G

    As the end of 2018 has arrived a few things keep popping on the radar…

    December 27, 2018

    Design for Office 365 Network Performance

    This article presents architectural design guidelines for enterprise networks providing Microsoft Office 365 services. Office…

    December 26, 2018

    Effectively Inspecting and Blocking Malicious Traffic

    Take a moment to imagine this scenario: Your company is going about its business, when,…

    December 22, 2018

    HTTP/2 Increases Web Page Performance

    Brief History of HTTP Way back in the days of telephone modems, pagers, and mainframes,…

    December 17, 2018

    Installing Ansible Modules for A10 Networks

    A10 Networks products are designed from the ground-up around an extensive set of Application Programming…

    December 17, 2018

    Common Management Tasks with aXAPI

    A10 Networks products with the Advanced Core Operating System (ACOS) technology include a comprehensive API…

    December 17, 2018

    Managing Network Devices with SSH Scripts

    Network and security devices typically have a text based or Command Line Interface (CLI) management…

    December 12, 2018

    Software Defined Networking with Advanced Application Delivery

    Organizations are striving to become more agile with the role of IT becoming paramount in…

    December 12, 2018

    Fast and Secure Microsoft Exchange Deployment

    Email System Architecture Email is one of the most commonly used and visible services provided…

    December 7, 2018

    Online Threats While Holiday Shopping

    With Thanksgiving over and holiday sales in full swing, the 2018 holiday season is upon…

    December 3, 2018

    KubeCon + CloudNativeCon 2018

    The Flagship Conference for Open Source and Cloud KubeCon, a conference dedicated to Kubernetes and…

    November 1, 2018

    Deployments with AppCentric Templates

    Deploying and configuring applications is time-consuming and stressful. Each deployment requires a different dashboard and…

    October 30, 2018

    How to Choose a Cloud Load Balancer

    Load balancing of application traffic has been around for a long time. But, as more…

    October 29, 2018

    Six Steps to Defend Against DDoS Attacks

    In the first half of this article, Understanding DDoS Attacks, we talked about the nuts…

    October 29, 2018

    Gartner IT Infrastructure Conference 2018

    As Traditional Data Centers Head for the Cloud, New Challenges Arise There’s never been a…

    October 17, 2018

    Verisign Distributed Denial of Service (DDoS Attack) Trends Report

    Verisign just released its Q2 2018 DDoS Trends Report, which represents a unique view into the…

    October 16, 2018

    Service Providers: Now You Can Build Automated and Extremely Profitable DDoS Scrubbing Services

    Distributed denial of service (DDoS) attacks are on the rise, and the attackers are eyeing…

    October 9, 2018

    Thunder TPS Achieves NimbusDDOS Certification

    We are proud to announce that our Distributed Denial-of-Service (DDoS) protection product, Thunder TPS, has…

    October 5, 2018

    Microsoft Ignite 2018 Targets Digital Business and Telcos

    Microsoft CEO Satya Nadella opened Microsoft Ignite 2018 with advice for busineses on staying relevant…

    September 26, 2018

    A10 Networks brings home the Gold!

    The threat landscape in today’s cyber world is changing rapidly. Data breaches are larger than…

    September 25, 2018

    Using Ansible to Defend against DDoS Attacks

    Building a Basic Layer of Protection from Common DDoS Attacks Distributed Denial of Service (DDoS)…

    September 25, 2018

    Understanding DDoS Attacks

    It’s clear the DDoS attacks aren’t going anywhere — in Q2 2017, the number of…

    September 25, 2018

    Next Generation Firewalls May Not Stop Malware

    Best Defense Against Malicious SSL Encrypted Traffic Bad actors and malicious insiders are concealing threats…

    September 14, 2018

    Using PowerCLI to Install vThunder

    What is VMware PowerCLI? VMware PowerCLI is a command-line and scripting tool built on Windows…

    September 14, 2018

    Cloud Bursting with A10 Lightning Application Delivery Controller

    Cloud bursting is an application deployment model in which an application that normally runs in…

    September 5, 2018

    Automate Secure Application Services in VMware Private Clouds

    The IT world is transitioning to the cloud. Upwards of 70% of Enterprises will utilize…

    August 21, 2018

    Defend Multi-Cloud Environments at Scale: Microsoft Ignite 2018

    Join A10 at Microsoft’s ultimate tech conference, Microsoft Ignite 2018, from September 24 – 28…

    August 14, 2018

    IoT and DDoS: Cyberattacks on the Rise

    The Internet of Things (IoT) may be a relatively new type of network, but it's…

    August 14, 2018

    How to Deploy an Ingress Controller in Azure Kubernetes

    What is the Azure Kubernetes Service? Azure Kubernetes Service (AKS) helps users to deploy a…

    August 7, 2018

    A10 Harmony Controller v4.1 Update

    Today, we announced new functionality for the A10 Harmony Controller v4.1 release, expanding A10’s multi-cloud…

    July 30, 2018

    Stay Ahead of Threats Today, Tomorrow, and Beyond: Black Hat 2018

    Automatic Cyber Security Defense A10 Networks is excited to meet you at Black Hat 2018,…

    July 16, 2018

    How to Defend Against Amplified Reflection DDoS Attacks

    What are Amplified Reflection DDoS Attacks? Amplified reflection attacks are a type of DDoS attack…

    July 10, 2018

    5G Service Providers Must Defend Their Networks

    5G technologies are poised to transform the way we live and work. They will also…

    July 9, 2018

    Create USB Installation Disk for ACOS

    A10 Networks ACOS operating system can be installed on bare metal servers from practically any…

    July 9, 2018

    Configuring Management Port on ACOS

    Standard Thunder configurations select a specific network interface to act as the Management port.  Management…

    July 9, 2018

    Configuring a Basic Firewall With A10 Thunder CFW

    The A10 Thunder Convergent Firewall (CFW) has a large set of technologies and features. This article will…

    July 9, 2018

    Publishing an Application Service With A10 Thunder CFW

    This article builds upon the article Configuration a Basic Firewall. Please refer to that article first to configure…

    June 21, 2018

    Brief History of Interop and ShowNet

    The Interop Tokyo 2018 Best of Show Awards are presented to the most outstanding products…

    June 20, 2018

    Application Load Balancer with Analytics for AWS GovCloud

    A10 announces the immediate availability of its Harmony Controller SaaS with Lightning ADC for AWS GovCloud.…

    June 19, 2018

    Security for Intent-Based Networking

    Networks have become more massive and complex than ever before. This year at Cisco Live…

    June 14, 2018

    aFleX Tutorial: Scripting Tool for Thunder Products

    What is aFlex? aFleX is a scripting tool that is built into the Thunder Application…

    June 14, 2018

    Top 3 Issues at Gartner Security & Risk Management Summit 2018

    As the number of connected devices and systems grows, so does the number of threats…

    June 11, 2018

    Announcing Application Load Balancing for Kubernetes

    With more application workloads moving to containers, Kubernetes is becoming de-facto standard. According to SDxCentral,,…

    June 9, 2018

    DDoS Attacks on IPv6

    IPv6.  We've heard it's been coming for years but no, it's not here yet.  However…

    May 24, 2018

    A10 Networks at AFCEA DCOS 2018: Multi-Cloud Security

    This year’s AFCEA DCOS focused on 3 D’s: Driving innovation, delivering solutions, and defending the…

    May 22, 2018

    Discover the Future of Defense: Join A10 Networks at Cisco Live US

    Imagine a future protected by intuitive security that informs, connects, predicts, and enables. A10 Networks…

    April 26, 2018

    What We Learned at RSA 2018

    We were excited to meet so many of you at RSA 2018 last week. Security…

    April 24, 2018

    DDoS Threat Intelligence Map from A10

    Data is not a defense. You need actionable intelligence. Security researchers are swamped with massive…

    April 17, 2018

    Join A10 Networks, Heavy Reading and Vodafone at the Big Communications Event 2018

    It’s not too long until this year’s Big Communications (BCE) event and telecom experts from…

    April 10, 2018

    What is the Cyber Security Gap? Learn about A10's Security Ecosystem at RSA

    A10 helps customers bridge the cyber security gap by working with an ecosystem of partners…

    April 2, 2018

    The Evolving Landscape of Service Provider Security

    Protecting only the Gi Interface is no longer enough Mobile networks are evolving quickly, and…

    March 27, 2018

    Tips for Revamping Your Mobile Network Security Model for IoT & 5G

    Market research estimates 5G may require a network investment of $250 billion in the US…

    March 22, 2018

    SSL Inspection is Imperative Under GDPR

    The European Union (EU) is set to enact the General Data Protection Regulation (GDPR) in…

    March 14, 2018

    See, Monitor, and Control Your Network Traffic

    The war we are  fighting is in cyberspace, and the battlegrounds are enterprise applications. Earlier…

    March 13, 2018

    GDPR to Put a High Price on Security Breaches

    Security breaches are already costly; not just financially, but in terms of brand damage, customer…

    March 12, 2018

    5 Ways IoT Threats Can Crumble Your DDoS Defenses

    Distributed denial of service (DDoS) attackers have mastered the art of control when it comes…

    March 8, 2018

    A10 Customers and Ansible: A Look Toward 2019

    Our goal is to move our customers forward with Ansible and help them achieve their…

    March 7, 2018

    Dawn of a New Threat: The IoT DDoS Invasion

    The game has changed. Attackers now weaponize connected devices to launch destructive distributed denial-of-service (DDoS)…

    March 6, 2018

    For Enterprise DDoS Defense, Cloud Alone Just Doesn't Cut It

    Enterprises face a dilemma when it comes to defense against today’s modern DDoS attacks: trust…

    March 5, 2018

    Announcing the Ultimate DDoS How-to-Guide For Cyber Warriors

    The rise of distributed denial-of-service (DDoS) attacks sees no slowdown in the near future. In…

    March 1, 2018

    What is A10 Doing with Ansible?

    Ever-increasing network complexity is driving the need for flexible tools that enable telecommunications and service…
    <