Blog
About Donald Shin
A10 Blog / Author / Donald Shin
Don has over 15 years of experience in the Networking and Security industries. Prior to A10, Don work in a variety of roles in R&D, product management, and marketing focused on network security, security efficacy testing, semiconductors and Cloud security. He is passionate about helping customer's improve their security posture and speaks frequently at security conferences.
Recent Posts By the Author
April 17, 2019
Five Ways Automation Puts Time on Your Side During a DDoS Attack
DDoS attacks can be catastrophic, but the right knowledge and tactics can drastically improve your chances of successfully mitigating attacks. That's what we'll…
January 21, 2019
The State of DDoS Weapons, Q1 2019
A new version of the State of DDoS Weapons Report has been published. Learn more about the new report here. (Archived) A10 Network's…
October 16, 2018
Service Providers: Now You Can Build Automated and Extremely Profitable DDoS Scrubbing Services
Distributed denial of service (DDoS) attacks are on the rise, and the attackers are eyeing new prey. According to Neustar, 84 percent of…
October 9, 2018
Thunder TPS Achieves NimbusDDOS Certification
We are proud to announce that our Distributed Denial-of-Service (DDoS) protection product, Thunder TPS, has achieved NimbusDDOS certification for defense efficacy. A10 Networks’…
July 16, 2018
How to Defend Against Amplified Reflection DDoS Attacks
What are Amplified Reflection DDoS Attacks? Amplified reflection attacks are a type of DDoS attack that exploits the connectionless nature of UDPs with…
April 24, 2018
DDoS Threat Intelligence Map from A10
Data is not a defense. You need actionable intelligence. Security researchers are swamped with massive volumes of data created during attempted attacks every…
March 6, 2018
For Enterprise DDoS Defense, Cloud Alone Just Doesn't Cut It
Enterprises face a dilemma when it comes to defense against today’s modern DDoS attacks: trust the surgical precision of an on-premise DDoS protection…
January 17, 2018
DDoS Protection Demands a Hybrid Approach
Picture this: a DDoS attack is crushing your network. Your enterprise’s internet pipe is under siege and almost to capacity. There’s nowhere else…
October 16, 2017
Data-Driven DDoS Protection Decision Making
The unrelenting wave of multi-vector DDoS attacks has blossomed into a full-fledged systemic problem for organization of all sizes. And it shows no…
August 7, 2017
Analytics, Good Identity Hygiene Are Key to Cloud Security
As cloud computing has matured, the benefits it delivers to organizations of all sizes are undeniable. Companies are enjoying agility, scale and speed…