• |
|

February 12, 2018

About Andrew Hickey

Andrew Hickey serves as A10's editorial director. Andrew has two decades of journalism and content strategy experience, covering everything from crime to cloud computing and all things in between.


All posts by the Author

February 12, 2018

WEST 2018: Cybersecurity Should Be 'Uncompromising'

The Department of Defense wants to ensure that any industry partners and suppliers it works with follow proper cyber hygiene practices to protect information and data. “In terms of protecting our data and protecting their information, there should be this standard,” Deputy Defense Secretary Patrick Shanahan said during his opening keynote of WEST 2018, a conference…

February 8, 2018

What Are You Doing to Inspect Encrypted Traffic? [Video]

Adversaries are using sophisticated tactics to bypass security defenses and infiltrate networks. Along with employing HTTPS, they’ve begun using SSH and other advanced protocols for data exfiltration. SSH, for example, is often used for remote management access because it performs well. Adversaries now use remote desktop protocol (RDP) and data exfiltration over SSH. And when…

February 5, 2018

Cryptocurrency: The Newest DDoS Battlefield

Cryptocurrency is hot. How hot? So hot that financier James Altucher predicted that cryptocurrencies will replace some or all paper money. “Cryptocurrencies will replace some or all paper currencies in the long run," he told CNBC. "Institutions aren't yet in bitcoin, but they will be ... we are in inning 0 of this asset class."…

February 1, 2018

Three Misconceptions of Breaking and Inspecting SSL Traffic [Video]

There are a lot of misconceptions about breaking and inspecting SSL traffic. So much so that some companies elect to go without the ability altogether. In this video, A10 Senior Federal Lead SE James Schweitzer separates fact from fiction when it comes breaking and inspecting encrypted traffic and highlights the benefits of a dedicated decryption…