Babur Khan
November 5, 2021

About Babur Khan

Babur Nawaz Khan is a Technical Marketing Engineer at A10 Networks. He primarily focuses on A10's Enterprise Security and DDoS Protection solutions. Prior to this, he was a member of A10's Corporate Systems Engineering team, focusing on Application Delivery Controllers. Babur holds a master's degree in Computer Science from the University of Maryland, Baltimore County.

Recent posts by the Author

November 5, 2021

A Closer Look at Zero Trust Cybersecurity Strategy Adoption

As organizations seek to protect more open enterprise networks and more distributed workforces from ransomware, DDoS attacks, and other threats, Zero Trust has taken root as a foundational element of modern cybersecurity. The premise is simple: by requiring verification of every user, at every entry point—even inside the network—before granting access, companies can keep hackers…

November 1, 2021

Twitch Hack, Data Exfiltration Shows Twitch Creator Payouts

It's not an “if,” it’s a “when.” No matter what you do, no matter how robust your think your cyber defenses are, one way or another your organization will eventually get hacked. If you're lucky, the consequences of the attack will be minimal—maybe just an easily analyzed and resolved website defacement. On the other hand,…

October 28, 2021

Encrypted Traffic Inspection Lags as Malware Rises

Ransomware, malware, and other forms of cyber-attacks continue to rise. Ransomware alone increased by 151 percent globally in the first half of 2021; according to the FBI, there are now 100 different strains at large. Even in the face of this threat,   inspect less than half of their web traffic for attacks, intrusions, and…

October 20, 2021

The Gaming Industry’s Latest Challenge: DDoS Protection

Like moths to a flame, hackers always go where the action is. As the COVID-19 pandemic drove work away from the office, businesses have faced one cyber attack after another on their remote work infrastructure. Meanwhile, a boom in virtual entertainment has brought a surge of players to the gaming industry—and with them, a rise…

October 13, 2021

7 Strategies for CSO Cyber Security Survival

Chief security officers (and CIOs, CISOs) have never had it so tough. Not only do they have all the traditional responsibilities to take care of such as day-to-day operations safeguarding the corporation’s physical assets, and crisis management, but now all of that has to be done under a cyber security threat environment that's orders of…

September 29, 2021

Evaluating a TLS / SSL Decryption Solution

Encryption is essential for data privacy—but it can also create security blind spots. The problem is simple: using Transport Layer Security (TLS) and Secure Sockets Layer (SSL) encryption can keep computer hackers from snooping into your traffic, but it also has the same effect on your security devices, i.e., it stops them from weeding out…

July 8, 2021

Ransomware, Phishing, Zero Trust, and the New Normal of Cyber Security

When the COVID-19 pandemic struck, cyber criminals saw their opportunity, and they took it. With corporate offices, government agencies, schools, and universities shifting from in-person to remote work models, and even many healthcare interactions moving online, the rushed nature of the transition led to inevitable cyber security gaps. Consumer broadband and personal devices undermined the…

June 30, 2021

Malware Protection for Financial Services

Adding Centralized, Dedicated TLS/SSL Inspection Makes the Zero Trust Model Work "…the financial services industry continually has the highest cost of cybercrime,"– Chris Thompson, Global Security and Resilience Lead – Financial Services, Accenture Security Cybersecurity has become everyone’s problem because no one is immune to attacks, and just like a line of dominos, when one…

June 8, 2021

Executive Order for Cyber-Attack Prevention Promotes Zero Trust Architecture

After every election of the federal government, the new administration faces the same challenge: How to maintain and repair critical national infrastructure. Every administration inherits infrastructure built by previous administrations but rarely has that infrastructure been adequately funded for future maintenance. This is why, according to an analysis of the U.S. Department of Transport 2020…

June 3, 2021

Defeat Cryptojacking with Decryption and Inspection

Investors, early adopters, and tech-savvy consumers aren’t the only ones interested in cryptocurrency these days. Cybercriminals are now using ransomware-like tactics and poisoned websites to infiltrate company employees’ computers and secretly harness them for cryptocurrency mining—an exploit called cryptojacking. The implications of these attacks go beyond stolen processing power and undermined employee productivity. Simply by…