|
November 25, 2020

About Babur Khan

Babur Nawaz Khan is a Technical Marketing Engineer at A10 Networks. He primarily focuses on A10's Enterprise Security and DDoS Protection solutions. Prior to this, he was a member of A10's Corporate Systems Engineering team, focusing on Application Delivery Controllers. Babur holds a master's degree in Computer Science from the University of Maryland, Baltimore County.


Recent posts by the Author

November 25, 2020

Defending Enterprise Network Security: a DDoS Attack Primer

A survey by Neustar indicated that more than 80 percent of financial services firms estimate a loss of $10,000 per hour during a DDoS-related outage. The statistics in this report amplifies the need for financial institutions of any size to develop DDoS preparedness and remediation strategies. Cyberthreat actors don’t discriminate — they target both large…

November 3, 2020

Death by Ransomware: Poor Healthcare Cybersecurity

If hackers attack your organization and you’re in an industry such as financial services, engineering, or manufacturing your risks are mostly monetary. But when it comes to healthcare cybersecurity, not only is there significant financial jeopardy, people’s health and wellbeing are also at risk so the stakes are much, much higher. According to the Department…

November 2, 2020

Ransomware Attacks Threaten Election Security - and Much More

Computer Hackers Target Governments, Healthcare Systems, Educational Institutions and Corporations In an already unpredictable U.S. election season, one of the biggest questions at hand is whether government agencies will be able to protect the vote from ransomware attacks—and it’s far from a sure thing that they will. The Cybersecurity Infrastructure Security Agency, or CISA, part…

October 20, 2020

Why are Government Agencies So Vulnerable to Hacking?

In network security we talk about “attack surfaces,” the term for the total number of points or vectors through which an attacker could try to enter a computing environment. As government organizations at the federal, state, county, and municipal levels have become increasingly digital, their attack surfaces have vastly increased and consequently they’ve become far…

August 6, 2020

Threat Intelligence Report: DDoS Attacks Intensify in Q2 2020

DDoS attacks continue to grow in size, frequency and sophistication. DDoS botnet weapons remain as popular as ever, while modern malware is gaining new ways to infect IoT systems and recruit them as drones. Reflected amplification attacks are helping hackers intensify the impact of their efforts. In challenging times like these, for enterprise security professionals,…

August 3, 2020

Key differences Between TLS 1.2 and TLS 1.3

Transport Layer Security (TLS) is a foundational technology for online privacy. As a cryptographic protocol, Transport Layer Security encrypts data and authenticates connections when moving data over the internet via HTTP—an extension of the protocol known as HTTPS (Hyper Text Transfer Protocol Secure). When a user visits a website, their browser checks for a TLS…

July 29, 2020

Defeat Emotet Malware with SSL Interception - No Mask Needed

The Emotet trojan recently turned from a major cybersecurity threat to a laughingstock when its payloads were replaced by harmless animated GIFs. Taking advantage of a weakness in the way Emotet malware components were stored, white-hat hackers donned their vigilante masks and sabotaged the operations of the recently revived cyberthreat. While highly effective as well…

June 11, 2020

Zero Trust Model is Meaningless Without TLS Inspection

Protecting users against modern, invisible cyber threats A security strategy is only as strong as its weakest point. No matter how extensive your network defenses are, if there is even one blind spot, you are still vulnerable to attacks. This is true even for the Zero Trust model, at the core of modern cybersecurity. Fortunately,…

April 1, 2020

How to Prevent Cyber Attacks During the COVID-19 Pandemic

COVID-19 Brings New Cyber Threats and Cyber Attacks Unless you were on a long desert meditation trip like Jared Leto, it is impossible not to have heard about the Coronavirus or COVID-19 (Coronavirus Disease) pandemic sweeping through the globe. At the time of writing this blog, there have been over half a million confirmed cases…

March 25, 2020

Curing Healthcare Cyber Security - A Better Way To Protect Patient Data

The Hippocratic Oath commands doctors to “first, do no harm.” Healthcare professionals have a proud tradition of honoring this commitment to their patients—but in today’s data-centric world, they face an equal obligation to secure the Protected Health Information (PHI), Personally Identifiable Information (PII), and financial data of their patients as well. And ironically, one of…