Andrew Hickey
February 5, 2019

About Andrew Hickey

Andrew Hickey serves as A10's editorial director. Andrew has two decades of journalism and content strategy experience, covering everything from crime to cloud computing and all things in between.

Recent posts by the Author

February 5, 2019

Faster, More Affordable Than Citrix & F5 ADC SSL Offloading

Traditionally, if you were looking for Application Delivery Controller (ADC) and server load balancing SSL offload solutions that were faster, better and more affordable, you were forced to pick two of the three. If you wanted faster and more affordable, you had to pay out the nose. If you wanted better and more affordable, you…

February 12, 2018

WEST 2018: Cybersecurity Should Be 'Uncompromising'

The Department of Defense wants to ensure that any industry partners and suppliers it works with follow proper cyber hygiene practices to protect information and data. “In terms of protecting our data and protecting their information, there should be this standard,” Deputy Defense Secretary Patrick Shanahan said during his opening keynote of WEST 2018, a conference…

February 8, 2018

What Are You Doing to Inspect SSL Encrypted Traffic?

Adversaries are using sophisticated tactics to bypass security defenses and infiltrate networks. Along with employing HTTPS, they’ve begun using SSH and other advanced protocols for data exfiltration. SSH, for example, is often used for remote management access because it performs well. Adversaries now use remote desktop protocol (RDP) and data exfiltration over SSH. And when…

February 5, 2018

Cryptocurrency: The Newest DDoS Attack Battlefield

Cryptocurrency is hot. How hot? So hot that financier James Altucher predicted that cryptocurrencies will replace some or all paper money. “Cryptocurrencies will replace some or all paper currencies in the long run," he told CNBC. "Institutions aren't yet in bitcoin, but they will be ... we are in inning 0 of this asset class."…

February 1, 2018

Three Misconceptions of Breaking and Inspecting SSL Traffic

There are a lot of misconceptions about breaking and inspecting SSL (Secure Sockets Layer) traffic. So much so that some companies elect to go without the ability altogether. In this video, A10 Senior Federal Lead SE James Schweitzer separates fact from fiction when it comes breaking and inspecting encrypted traffic and highlights the benefits of…

January 25, 2018

The Importance of Staying Left of the SSL Encryption Exploit

Lockheed Martin’s Cyber Kill Chain framework is part of an intelligence-driven defense model to identify and prevent cyber intrusions. The seven steps are designed to track advanced persistent threats and enhance visibility into an attack while understanding an attacker’s techniques and tactics. Steps three and four – delivery and exploitation – are where A10 Networks comes in.…

January 25, 2018

Modernize and Secure Military and Government Networks

The cyberwar is unyielding. Day by day, minute by minute, new threats emerge. Military and government agencies need solutions to not only fortify government networks and combat sophisticated threats, but to also modernize their infrastructure to alleviate management and operational headaches. WEST 2018, co-sponsored by AFCEA International and the U.S. Naval Institute, runs Feb. 6…

January 24, 2018

Automation: The Third Stop on Your Cisco Live EMEA Digital Journey

Automate all the things! Sure, it’s a slogan from a meme, but each day it becomes closer to reality for IT pros. Using modern software solutions and frameworks, many tasks can now be automated, eliminating the need for time-consuming manual intervention from IT staff. Automation is hot right now, and at Cisco Live EMEA in…

January 18, 2018

Hybrid Cloud: Stop No. 2 on Your Cisco Live Journey

Hybrid cloud. It’s a term that’s thrown around quite a bit. It’s defined as the ability for enterprises to have applications run in different infrastructures – public clouds and private clouds and on-premise with common orchestration and management tools. In our cloud predictions for 2018, A10’s Cloud Vice President Kamal Anand notes: “Multi-cloud, with different…

January 11, 2018

Application Security: The First Stop on Your Cisco Live Journey

Crushing multi-vector DDoS attacks. Threats concealed in SSL encrypted traffic. Attackers are always trying to stay one step ahead of the defenders. They look for holes to exploit. They try to sneak in unnoticed. We must defend our applications and infrastructure against these malicious cyberattacks. At Cisco Live EMEA in Barcelona, your digital journey toward…