Donald Shin
November 11, 2019

About Donald Shin

Don has over 15 years of experience in the Networking and Security industries. Prior to A10, Don work in a variety of roles in R&D, product management, and marketing focused on network security, security efficacy testing, semiconductors and Cloud security.  He is passionate about helping customer's improve their security posture and speaks frequently at security conferences.

Recent posts by the Author

November 11, 2019

AWS Route 53 DDoS Attack Shows You’re Responsible for Availability

The recent AWS Route 53 DNS attack should make you consider who is responsible for availability when we outsource key services. The attack highlights how dependent businesses have become on our wide swath of communication service providers (CSPs) and how this reliance impacts our business availability. As with Route 53, hosting domain name system (DNS)…

September 24, 2019

Online Gaming Needs a Zero-Trust DDoS Defense

New Rules of the Game: Only the Trusted May Enter DDoS attackers continue to innovate so leaving your digital front door open and waiting to react against a DDoS attack just doesn’t cut it anymore. Adrenaline-fueled gaming platform operators need to apply zero-trust principles. The concept of zero trust, which was developed by former Forrester…

September 5, 2019

Yikes! Another DDoS Weapon, WS-Discovery Amplification Attacks

Web Services Dynamic Discovery Services Weaponized for DDoS Reflected amplification attacks continue to be the DDoS attacker’s weapon of choice. From an attacker’s perspective, that makes sense because there is no malware to develop or intrusion involved in exploiting someone else’s computing and networking capabilities. Simply, spoof your victim’s IP address as the requester and…

August 14, 2019

The State of DDoS Weapons, Q2 2019

A new version of the State of DDoS Weapons Report has been published. Learn more about the new report here.   (Archived) DDoS attacks continue to grow in frequency, intensity and sophistication. However, the delivery method--using infected botnets and vulnerable servers to perform these attacks--remains the same. That said, we are seeing some new attack…

July 29, 2019

Beat Gaming Cheaters and DDoS Spoilers with Real-time Packet Watermarking

Gaming, for entertainment or gambling, seems to bring out the worst in the worst people. Cheaters leverage an ecosystem of nefarious tool developers to get a competitive edge with new ways to unfairly advance, obstruct competitors, or attack the hosting platforms. How prevalent is the problem? A study by Irdeto provides some interesting insights into…

July 24, 2019

How Zones Facilitate a Proactive DDoS Defense that Protects Real Users

The primary objective of DDoS protection is to ensure availability of services to legitimate users. Secondarily, protecting the service's infrastructure from being overwhelmed aligns with safeguarding a user's access. Sometimes, DDoS defenders miss the nuances of this priority because IT gets graded on a measurable five-nines uptime, but rarely on user experience. When the user…

July 18, 2019

New Approaches to DDoS Protection Offer Better Security and Economic Scale

Distributed denial of service (DDoS) attacks are only going to increase over time and attackers have an ever-expanding opportunity to use new device types, like IoT to mount even larger attacks. Attacks sizes have jumped an order of magnitude in just the last five years. 41 percent of companies surveyed by IDC faced DDoS attacks…

July 11, 2019

How to Defend DNS Services from All Types of DDoS Attacks

First invented in 1983, the internet Domain Name System (DNS) is older than the World Wide Web itself. Only a select few people had access to the internet in the 1980s. Today, however, there are 4.1 billion internet users worldwide, 1.94 billion websites and about 342 million registered domain names, according to Hosting Facts. When…

June 4, 2019

Time for Zero-day DDoS defense

A10 Networks entered the DDoS defense market in 2014 by shattering the industry standard for performance and integrations with the Thunder TPS 6435, a 155 Gbps performance with 100 GbE networking DDoS defense appliance. It simplified deployment and changed the economics of building high-performance DDoS defenses. The impact on the market was dramatic. In fact,…

April 24, 2019

Three Ways to Block DDoS Attacks

In our previous post in this series, we discussed how automation can save you invaluable time during a DDoS attack. While it’s crucial to have an automated DDoS protection system in place that can quickly respond to attacks, it’s equally important to implement strategies that help achieve your goal of ensuring service availability to legitimate…