Donald Shin, Author at A10 Networks
  • |

November 11, 2019

About Donald Shin

Don has over 15 years of experience in the Networking and Security industries. Prior to A10, Don work in a variety of roles in R&D, product management, and marketing focused on network security, security efficacy testing, semiconductors and Cloud security.  He is passionate about helping customer's improve their security posture and speaks frequently at security conferences.

All posts by the Author

November 11, 2019

AWS Route 53 DDoS Attack Shows You’re Responsible for Availability

The recent AWS Route 53 DNS attack should make you consider who is responsible for availability when we outsource key services. The attack highlights how dependent businesses have become on our wide swath of communication service providers (CSPs) and how this reliance impacts our business availability. As with Route 53, hosting domain name system (DNS)…

September 24, 2019

Online Gaming Needs a Zero-Trust DDoS Defense

New Rules of the Game: Only the Trusted May Enter DDoS attackers continue to innovate so leaving your digital front door open and waiting to react against a DDoS attack just doesn’t cut it anymore. Adrenaline-fueled gaming platform operators need to apply zero-trust principles. The concept of zero trust, which was developed by former Forrester…

September 5, 2019

Yikes! Another DDoS Weapon, WS-Discovery Amplification Attacks

Web Services Dynamic Discovery Services Weaponized for DDoS Reflected amplification attacks continue to be the DDoS attacker’s weapon of choice. From an attacker’s perspective, that makes sense because there is no malware to develop or intrusion involved in exploiting someone else’s computing and networking capabilities. Simply, spoof your victim’s IP address as the requester and…

August 14, 2019

The State of DDoS Weapons, Q2 2019

DDoS attacks continue to grow in frequency, intensity and sophistication. However, the delivery method--using infected botnets and vulnerable servers to perform these attacks--remains the same. That said, we are seeing some new attack threats on the horizon in IoT and 5G. Read on to learn more. Where DDoS Attacks Are Originating Although DDoS weapons are…