February 12, 2018

About Andrew Hickey

Andrew Hickey serves as A10's editorial director. Andrew has two decades of journalism and content strategy experience, covering everything from crime to cloud computing and all things in between.

Recent posts by the Author

February 12, 2018

WEST 2018: Cybersecurity Should Be 'Uncompromising'

The Department of Defense wants to ensure that any industry partners and suppliers it works with follow proper cyber hygiene practices to protect information and data. “In terms of protecting our data and protecting their information, there should be this standard,” Deputy Defense Secretary Patrick Shanahan said during his opening keynote of WEST 2018, a conference…

February 8, 2018

What Are You Doing to Inspect SSL Encrypted Traffic?

Adversaries are using sophisticated tactics to bypass security defenses and infiltrate networks. Along with employing HTTPS, they’ve begun using SSH and other advanced protocols for data exfiltration. SSH, for example, is often used for remote management access because it performs well. Adversaries now use remote desktop protocol (RDP) and data exfiltration over SSH. And when…

February 5, 2018

Cryptocurrency: The Newest DDoS Attack Battlefield

Cryptocurrency is hot. How hot? So hot that financier James Altucher predicted that cryptocurrencies will replace some or all paper money. “Cryptocurrencies will replace some or all paper currencies in the long run," he told CNBC. "Institutions aren't yet in bitcoin, but they will be ... we are in inning 0 of this asset class."…

February 1, 2018

Three Misconceptions of Breaking and Inspecting SSL Traffic

There are a lot of misconceptions about breaking and inspecting SSL traffic. So much so that some companies elect to go without the ability altogether. In this video, A10 Senior Federal Lead SE James Schweitzer separates fact from fiction when it comes breaking and inspecting encrypted traffic and highlights the benefits of a dedicated SSL/TLS…

January 25, 2018

The Importance of Staying Left of the SSL Encryption Exploit

Lockheed Martin’s Cyber Kill Chain framework is part of an intelligence-driven defense model to identify and prevent cyber intrusions. The seven steps are designed to track advanced persistent threats and enhance visibility into an attack while understanding an attacker’s techniques and tactics. Steps three and four – delivery and exploitation – are where A10 Networks comes in.…

January 25, 2018

Modernize and Secure Military and Government Networks

The cyberwar is unyielding. Day by day, minute by minute, new threats emerge. Military and government agencies need solutions to not only fortify their networks and combat sophisticated threats, but to also modernize their infrastructure to alleviate management and operational headaches. WEST 2018, co-sponsored by AFCEA International and the U.S. Naval Institute, runs Feb. 6…

January 24, 2018

Automation: The Third Stop on Your Cisco Live EMEA Digital Journey

Automate all the things! Sure, it’s a slogan from a meme, but each day it becomes closer to reality for IT pros. Using modern software solutions and frameworks, many tasks can now be automated, eliminating the need for time-consuming manual intervention from IT staff. Automation is hot right now, and at Cisco Live EMEA in…

January 18, 2018

Hybrid Cloud: Stop No. 2 on Your Cisco Live Journey

Hybrid cloud. It’s a term that’s thrown around quite a bit. It’s defined as the ability for enterprises to have applications run in different infrastructures – public clouds and private clouds and on-premise with common orchestration and management tools. In our cloud predictions for 2018, A10’s Cloud Vice President Kamal Anand notes: “Multi-cloud, with different…

January 11, 2018

Application Security: The First Stop on Your Cisco Live Journey

Crushing multi-vector DDoS attacks. Threats concealed in SSL encrypted traffic. Attackers are always trying to stay one step ahead of the defenders. They look for holes to exploit. They try to sneak in unnoticed. We must defend our applications and infrastructure against these malicious cyberattacks. At Cisco Live EMEA in Barcelona, your digital journey toward…

January 3, 2018

The Destination: Swift and Secure Applications

The modern digital journey can be fraught with peril. Disruptions, jitter, downtime – you name it ­– can all impede application performance. And let’s not forget today’s sophisticated security threats. From DDoS attacks to encrypted malware, there are myriad cyberthreats that can interrupt safe travel for data and applications as they traverse the network. You must…