fbpx
A10 Staff
|
August 9, 2022

About A10 Staff


Recent posts by the Author

August 9, 2022

The Log4j Exploit and Botnets

Of all the security issues that have appeared over the last few years, none has had the impact of the Log4j exploit. Also called the Log4Shell, it was reported to the developers, the Apache Software Foundation, on 24 November, 2021, by the Chinese tech giant Alibaba and it took two weeks to develop and release…

July 7, 2022

The Rise of Botnet and DDoS Attacks

Distributed Denial of Service (DDoS) attacks have become an everyday or, some might argue, an hourly problem. Using a variety of techniques, a wide range of threat actors from lone hackers, criminal gangs and hacktivists, to nation-states have and are using DDoS attacks. These attacks are carried out to degrade or disable the performance and…

June 1, 2022

Top Cyber War Techniques and Technologies

In our article Cyber Warfare: Nation State Sponsored Cyber Attacks, we discussed the nature of warfare in the virtual world of the internet and how it differs from conventional warfare. We also covered why some kind of “cybergeddon”—an all out cyber war—hasn’t happened and quite likely never will. In this post we’ll look at which…

May 17, 2022

Cyber Warfare: Nation State Sponsored Cyber Attacks

What is Cyber Warfare? The internet has changed how we view and interact with the world in a remarkable number of ways. Unfortunately, this change is not limited to just peacetime activities. The way wars are fought is also affected by this evolution. Now that every nation-state is tied into and reliant upon the internet…

February 3, 2022

Zero Trust Architecture: 5 Reasons You Need It

Security in the Real World People living in small towns usually know all their neighbors so hardly anyone locks their doors. But for people living in bigger towns, it’s much harder to know who their neighbors are, so everyone starts locking their doors. People not only lock their doors, they also install security systems, put…

January 10, 2022

Catch Up or Leap Forward: Bridging the Digital Divide

Technology as a Catalyst for Shared Value As we commence 2022, the time is now to reflect upon what our priorities and value really looks like, and the critical role that technology, connectivity, and partnership play in delivering upon these aspirations. As part of this, I believe helping to make ‘the invisible visible’ with regard…

July 19, 2021

5 Questions Before Delivering Your Applications to the Cloud

The time has come for enterprises around the world to face the truth: the traditional data center is dead and gone. In its place, multi-cloud, hybrid cloud and container-based infrastructures have risen. According to research from Aberdeen shared in the ebook, “Five Questions to Ask Yourself Before You Deliver Your Applications to the Cloud,” (a…

May 31, 2021

Simplifying Load Balancing in a Multi-cloud Environment

With the average enterprise are leveraging almost five clouds on average,* load balancing isn’t getting any simpler. In infrastructures of that size with applications deployed across multiple private clouds and public clouds, leveraging load balancing services from IaaS providers (such as AWS' ELB) just aren’t going to cut it. How can organizations ensure effective, efficient…

February 22, 2021

Erlend Prestgard on Mobile Core Networks and Telco 5G Security

In the “5G: Secure What Matters” blog post series, we showcase thought leaders and their unique perspectives on the intersection of 5G, security, and technology. We recently sat down with Erlend Prestgard, CEO of Working Group Two to get his views on 5G and 5G security. Tell us about yourself? I am Erlend Prestgard, CEO…

December 7, 2020

Algis Akstinas on 5G connectivity, IoT and M2M

In the “5G: Secure What Matters” blog post series, we showcase thought leaders and their unique perspectives on the intersection of 5G, security, and technology. We recently sat down with Algis Akstinas, CEO and Founder of Data On Tap, Inc. to get his views on 5G and 5G security. Tell us about yourself? I am…