A10 Networks Blog
February 13, 2025
The Dangers of Rushing into AI Adoption: Lessons from DeepSeek
February 5, 2025
Survey: Enterprises Seek New Load Balancing Vendors as Issues Mount
February 4, 2025
Elevating Cyber Resilience with AI-powered Security
December 9, 2024
Application Delivery Controller (ADC) Checklist: Five Criteria to Make the Right Choice
November 26, 2024
Is Implementing AI Complex? What Enterprise Leaders Should Know
November 25, 2024
Achieving Operational Resilience in an Increasingly Uncertain World
November 15, 2024
The Strategic Advantage of Hybrid DDoS Protection: Cost Efficiency and Enhanced Control
November 14, 2024
Accelerating IPv6 Adoption – Transitioning from Cost Benefit to Security Benefit
November 12, 2024
Why Bot Protection Matters
October 23, 2024
The Need for Next-Generation Web Application Firewalls (WAFs) in Modern Threat Landscape
October 8, 2024
Meeting Growing Regulatory Requirements
September 24, 2024
The Machine War Has Begun: Cybercriminals Leveraging AI in DDoS Attacks
July 16, 2024
The Importance of DDoS Threat Intelligence and Collaborative Data Sharing
July 10, 2024
Approaches to Efficient Multi-layered DDoS Protection
July 9, 2024
A Guide to Building Modern Approaches to DDoS Protection
June 10, 2024
Securing Web Apps on a Lean Budget Amid Economic Uncertainty and Growing Data Breaches
May 8, 2024
Global DDoS Weapons in 2024: Bots Run Wild
April 17, 2024
Carpet-bombing Attacks Highlight the Need for Intelligent and Automated DDoS Protection
March 26, 2024
The Imperative Need for Consolidation in Web App Security and Delivery
March 19, 2024
A10 Defend Threat Control: DDoS Defense Reimagined
March 13, 2024
Insight Into the DDoS Attacks on the French Government
October 30, 2023
Latest Vulnerability Triggers Record-breaking DDoS Attacks
October 24, 2023
Protecting Systems from the New HTTP/2 Rapid Reset Vulnerability
September 14, 2023
The Role of AI in Modern Cybersecurity: Beyond the Buzz
April 24, 2023
Fighting Cybercrime One Packet at a Time: A10 Next-Gen WAF, Powered by Fastly
April 17, 2023
Understanding DDoS = Containing DDoS
February 15, 2023
A10 Networks Provides Update to Cybersecurity Incident
January 11, 2023
This Month in Ransomware: Hospitals and Patients Affected
January 10, 2023
Data Center Operators React to Threats with DDoS Mitigation
January 4, 2023
Centralized TLS Decryption: The Prerequisite to SASE, SSE, Zero Trust
December 27, 2022
How to Defeat Emotet Malware with SSL Interception
December 20, 2022
2022 Ransomware Attacks and Evolution of Data Exfiltration
December 15, 2022
DOJ Charges Six for DDoS-for-hire Services, Kills 48 Sites
December 12, 2022
10 Data Breaches that Fuel CISO Nightmares
December 8, 2022
The Cost of a Data Breach and the Need for SSL Security
December 4, 2022
Systems Strike Ukraine with Amplification and DrDoS Attacks
November 21, 2022
DDoS Attack Prevention and DDoS Protection Best Practices
September 15, 2022
Integrated Security for Telco Cloud Edge and Private 5G
August 9, 2022
The Log4j Exploit and Botnets
July 7, 2022
The Rise of Botnet and DDoS Attacks
June 16, 2022
Zero Trust, Cloud and Remote Working Drive Digital Resiliency
June 1, 2022
Top Cyber War Techniques and Technologies
May 17, 2022
Cyber Warfare: Nation State Sponsored Cyber Attacks
May 4, 2022
The Global State of DDoS Weapons
February 3, 2022
Zero Trust Architecture: 5 Reasons You Need It
November 5, 2021
A Closer Look at Zero Trust Cybersecurity Strategy Adoption
November 2, 2021
Introducing L3-7 DDoS Protection for Microsoft Azure Tenants
November 1, 2021
Twitch Hack, Data Exfiltration Shows Twitch Creator Payouts
October 28, 2021
Encrypted Traffic Inspection Lags as Malware Rises
October 20, 2021
The Gaming Industry’s Latest Challenge: DDoS Protection
October 13, 2021
7 Strategies for CSO Cyber Security Survival
September 29, 2021
Evaluating a TLS / SSL Decryption Solution
July 21, 2021
DDoS Protection Major Concern for Middle East Service Providers
July 16, 2021
COVID-19 Forces UK Communications Service Providers to Prioritize Cyber Security and Business Continuity
July 8, 2021
Ransomware, Phishing, Zero Trust, and the New Normal of Cyber Security
July 2, 2021
Why French enterprises are unlikely to return to pre-pandemic working practices
June 30, 2021
Malware Protection for Financial Services
June 29, 2021
Majority of Indian Enterprises Accelerated Investment Around Cyber Security in 2020: A10 Networks Study
June 8, 2021
Executive Order for Cyber-Attack Prevention Promotes Zero Trust Architecture
June 3, 2021
Defeat Cryptojacking with Decryption and Inspection
May 27, 2021
Driving Digital Transformation with Effective Application Delivery and Security
May 26, 2021
How Zero Trust Could Have Stopped DarkSide’s Ransomware Malware
March 5, 2021
A10 a Strong Performer in DDoS Mitigation Solutions Report, Q1 2021
February 10, 2021
In the Midst of COVID-19, We're Seeing a Pandemic of Cyber Attacks
January 25, 2021
2020 Was a Busy Year for DDoS Attacks
December 22, 2020
The Implications of the SolarWinds Cyberattack
December 9, 2020
Multi-cloud and Cyber Security Dominate E-commerce IT
November 25, 2020
Defending Enterprise Network Security: a DDoS Attack Primer
November 24, 2020
Secure your Online Sales from Cybersecurity Threats during the Holiday Season
November 18, 2020
Fast Detection Protects Critical MEC Services from DDoS Attacks
November 3, 2020
Death by Ransomware: Poor Healthcare Cybersecurity
November 2, 2020
Ransomware Attacks Threaten Election Security - and Much More
October 20, 2020
Why are Government Agencies So Vulnerable to Hacking?
August 12, 2020
Strengthening DNS Security with DNS over HTTPS (DoH)
August 10, 2020
When the Internet of Things (IoT) is Armed as an IoT Botnet
August 6, 2020
Threat Intelligence Report: DDoS Attacks Intensify in Q2 2020
July 8, 2020
NXNSAttack: A New DDoS Attack on Recursive DNS Resolvers
July 6, 2020
What's so bad about the NXNSAttack DNS Amplification Attack?
June 24, 2020
AWS hit by Largest Reported DDoS Attack of 2.3 Tbps
June 11, 2020
Zero Trust Model is Meaningless Without TLS Inspection
June 3, 2020
Delivering DDoS Protection, HTTP/3 and QUIC Protocol Protection
April 1, 2020
How to Prevent Cyber Attacks During the COVID-19 Pandemic
March 25, 2020
Curing Healthcare Cyber Security - A Better Way To Protect Patient Data
March 19, 2020
Security in a Multicloud Environment
March 18, 2020
What You Need to Know About DDoS Weapons Used in DDoS Attacks
March 6, 2020
Jim Brisimitzis on 5G, Edge Computing and AI
March 5, 2020
Enabling DNS over HTTPS (DoH) with Thunder CFW
February 27, 2020
McAfee and A10 Networks Secure the Network Edge Against Modern Attacks
February 26, 2020
5G Security Has Finally Arrived
February 20, 2020
Automation that Matters and Eliminates “Fat Finger” Errors
February 11, 2020
Will Lassalle on 5G Security, DDoS Attacks and Gaming
February 6, 2020
Realizing the Full Value of the Multi-access Edge Compute (MEC)/5G Opportunity
February 5, 2020
In the Super Bowl of 5G, Speed and Security Matter the Most
January 31, 2020
Managing Multi-cloud Chaos
January 23, 2020
Isaac Sacolick on 5G Networks, IoT and the Future of Mobility
December 23, 2019
Why Roaming Still Matters in a 5G World
December 19, 2019
GTP Remains a 5G Security Threat as Operators Transition to 5G
December 17, 2019
In 2020: My Toothbrush Will Be Hacked
December 11, 2019
For 2020: Ransomware Cyber Attacks are the Norm
December 9, 2019
Boosting mobile revenue with 5G security-as-a-service
December 2, 2019
5G - The Transformation Generation
November 21, 2019
Evolving Application Delivery for a Hybrid, Multi-cloud, Containerized World
November 14, 2019
A Strong 5G Security Posture is Critical for IoT
November 11, 2019
AWS Route 53 DDoS Attack Shows You’re Responsible for Availability
November 9, 2019
SSL Decryption: Security Best Practices and Compliance
November 4, 2019
Selecting the Best ADC Scale-out Solution for Your Environment
October 17, 2019
The Evolution of IoT with 5G: Future-proofing Current IoT Investment
October 3, 2019
DDoS Attacks on Carrier Grade NAT Infrastructure
October 2, 2019
What are SYN Cookies and How are they Used?
September 26, 2019
Advantages of Hybrid DDoS Cloud Over Pure Cloud
September 24, 2019
Online Gaming Needs a Zero-Trust DDoS Defense
September 17, 2019
Insights Around the Journey to 5G
September 16, 2019
DDoS Scrubbing and Intelligent Automation Generates Profit
September 5, 2019
Yikes! Another DDoS Weapon, WS-Discovery Amplification Attacks
August 28, 2019
Protecting the edge of 5G and Multi-cloud Networks
August 15, 2019
GTP and The Evolution of Roaming
August 14, 2019
The State of DDoS Weapons, Q2 2019
August 13, 2019
The Top 7 Requirements for Optimized Traffic Flow and Security in Kubernetes
August 12, 2019
What Service Providers (and Enterprises) Need to Know About DDoS Scrubbing Services
July 30, 2019
Mayors of America, Beware! – Ransomware is coming to town
July 29, 2019
Beat Gaming Cheaters and DDoS Spoilers with Real-time Packet Watermarking
July 24, 2019
How Zones Facilitate a Proactive DDoS Defense that Protects Real Users
July 22, 2019
5G is About to Change the World. Here’s How it Works
July 18, 2019
New Approaches to DDoS Protection Offer Better Security and Economic Scale
July 17, 2019
TLS 1.3 - Status, Concerns & Impact
July 16, 2019
Enforcing GDPR - A New Era of Accountability and Fines
July 15, 2019
Remember Roaming? Let Your Subscribers Roam Securely
June 25, 2019
A10 & Dell EMC Partner to Deliver 5G Security, Multi-cloud Solutions
June 24, 2019
This Is How Much Time and Money a DDoS Attack Will Cost You
June 19, 2019
The Urgency of Network Security in the Shared LTE/5G Era
June 12, 2019
How to Deploy the A10 Networks Secure Service Mesh in Red Hat OpenShift
June 6, 2019
Top Seven DDoS Protection Challenges
June 4, 2019
Time for Zero-day DDoS Defense
June 3, 2019
The Bumpy Road to 5G – A Secure Gi-LAN can Help
May 30, 2019
Why DDoS Attackers Love Companies with Multiple Data Centers
May 23, 2019
Why Half of Companies Are Raising Their DDoS Defense Budgets
May 8, 2019
DDoS Attacks Against CSPs: What You Need to Know
May 6, 2019
Advanced 5G Security Is Fundamental to 5G Success
April 24, 2019
Three Ways to Block DDoS Attacks
April 22, 2019
Three Reasons You Need DDoS Weapons Intelligence
April 17, 2019
Five Ways Automation Puts Time on Your Side During a DDoS Attack
March 14, 2019
How the 5G Telco Market is Transforming with Lessons Learned from the Enterprise
March 6, 2019
Importance of Gi-LAN functions consolidation in the 5G world
March 5, 2019
Ludicrous Performance for Software SSL
February 19, 2019
The State of DDoS Attacks: The Best Offense is a Strong Defense
February 5, 2019
Faster, More Affordable Than Citrix & F5 ADC SSL Offloading
January 21, 2019
The State of DDoS Weapons, Q1 2019
December 26, 2018
Effectively Inspecting and Blocking Malicious Traffic
December 7, 2018
Online Threats While Holiday Shopping
October 17, 2018
Verisign Distributed Denial of Service (DDoS Attack) Trends Report
September 25, 2018
Next Generation Firewalls May Not Stop Malware
June 19, 2018
Security for Intent-Based Networking
April 24, 2018
DDoS Threat Intelligence Map from A10
March 22, 2018
SSL Inspection is Imperative Under GDPR
March 13, 2018
GDPR to Put a High Price on Security Breaches
March 7, 2018
Dawn of a New Threat: The IoT DDoS Invasion
March 5, 2018
Announcing the Ultimate DDoS How-to-Guide For Cyber Warriors
February 12, 2018
Avoid the SSL Encryption Shadow Monster: A Look at SSL Decryption
February 8, 2018
What Are You Doing to Inspect SSL Encrypted Traffic?
February 5, 2018
Cryptocurrency: The Newest DDoS Attack Battlefield
January 25, 2018
The Importance of Staying Left of the SSL Encryption Exploit
November 28, 2017
A10 Thunder SSLi Removes the SSL/TLS Blind Spot
November 16, 2017
Don’t Spend Your Information This Black Friday
November 15, 2017
Should You Fear the Reaper Botnet?
November 9, 2017
Right-Size and Strengthen Your DDoS Defenses
October 30, 2017
Things That Go Bump in the Night (or in Encrypted Traffic)
October 26, 2017
Uncover Threats Hidden in Encrypted SSL Traffic
October 25, 2017
Talking DDoS Attacks, Security Threats with Layer 3 Communications
October 16, 2017
Data-Driven DDoS Protection Decision Making
October 11, 2017
A One-Two Punch to Knock Out DDoS Attacks
September 13, 2017
In DDoS Defense, Pinpoint Precision Is Imperative
August 30, 2017
If You Answer ‘Yes’, You Need Dedicated SSL Inspection
August 24, 2017
DDoS Protection and IPv6 Migration in Online Gaming Industry
August 3, 2017
Data Theft, Data Exfiltration and Breaches and Leaks
June 5, 2017
Advanced Processing Power for Advanced SSL Encryption
May 21, 2017
How the Best Communication Service Providers Thwart DDoS Attacks
March 23, 2017
Want to Combat the DDoS of Things? Use These Five Tactics
March 22, 2017
A10, Fidelis Cybersecurity Partnership Brings Visibility to the Largest Network Blind Spot
March 17, 2017
IoT Devices Are Powering Affordable DDoS-for-Hire Services
March 10, 2017
The Dawn of the DDoS of Things (DoT)
March 9, 2017
Alleged C.I.A. Hacking Documents Reinforce Need for SSL Traffic Inspection
February 28, 2017
Video: A Security Detail for 5G and Mobile Threats
February 28, 2017
Safeguarding Mobile Service Providers from the Evolving Threat Landscape
February 22, 2017
Video: The Cyber Security Carousel Requires Protection Before, During and After
February 13, 2017
Report: 1 Tbps DDoS Attacks to Increase 500 Percent in 2017
February 2, 2017
How CSOs Can Avoid the Shadow of a Cyber Security Groundhog Day
February 1, 2017
Austrian Hotel Hack: Cyber Attacks Can Affect Anyone
January 17, 2017
Cash to Cash-free: Best Practices for Digital Payments
December 16, 2016
Video: Three CSO Holiday Gift Ideas
November 24, 2016
Cybersecurity Failures Can Make Black Friday a Nightmare
November 16, 2016
Improved Application Security with App Transport Security (ATS)
November 14, 2016
Exorcising the Demons: Malware, Viruses and DDoS Attacks
November 2, 2016
Webinar: Defeat Colossal DDoS Attacks with Precision
October 25, 2016
When Devices Attack: Surviving the IoT Invasion
October 17, 2016
The DDoS Arms Race
October 13, 2016
They’re Calling from Inside the House: Surviving Insider Threats
October 11, 2016
DDoS Defense: Is Your Network Protected Against DDoS Attacks?
October 6, 2016
Chief Security Officer (CSO) Survival Techniques
September 29, 2016
Are Retailers Using SSL Inspection? Not According to Ponemon
September 23, 2016
Patch Available for CVE-2014-8730 Padding Flaw
September 23, 2016
CBS: ‘Ugly List’ Instagram Phishing Scam Targets Children, Young Users
September 22, 2016
Cybersecurity and Outrunning the ‘Zombie Marathon’
September 21, 2016
Opportunities Afforded by an Application Delivery Controller Refresh
September 20, 2016
SSL Inspection Misconceptions Examined by CIO.com
September 14, 2016
Financial Industry not Prepared for Attacks in Encrypted Traffic
September 7, 2016
SSL Decryption by the Numbers [Infographics by Industry]
August 30, 2016
Ponemon: Healthcare Not Deploying SSL Inspection Solutions
August 30, 2016
A10, Cisco Partner in War on Encrypted Threats
August 26, 2016
Why SSL Inspection is a Must
August 22, 2016
Predictive Analytics: Fad or the Future of Cyber Security?
August 17, 2016
DDoS Attacks Spark Australian Census Site Shutdown
August 16, 2016
Ponemon: SSL Inspection Not a Priority for Federal Agencies
August 12, 2016
Black Hat USA: 4 Cyber Security Trends from Vegas
August 4, 2016
A10 Networks, Cylance Partner to Integrate Real-Time Cybersecurity to Defeat Encrypted Attacks
August 3, 2016
SSL Inspection — Why Don’t More Organizations Do It?
June 14, 2016
Human Error: Harsher Penalties Affecting Cybersecurity ROI
June 10, 2016
CVE-2016-0270 GCM nonce vulnerability
May 2, 2016
Today’s DDoS Attacks: Separate Truth from Fiction
May 2, 2016
The Ransomware Remedy for Healthcare Organizations: SSL Traffic Inspection
January 31, 2016
OpenSSL Advisory from 2016-01-28
December 10, 2015
OpenSSL Advisory from 2015-12-03
July 9, 2015
CVE-2015-1793: OpenSSL Alternative chains certificate forgery
June 28, 2015
Have State-Sponsored Hackers Infiltrated Your Network?
June 9, 2015
DDoS Attacks by the (version) numbers
November 25, 2014
TPS 3.1 is here: Do You Have Visibility into DDoS Attacks?
November 12, 2014
The Not-so-Hidden DDoS Arsenal Knocking at Your Network Door
October 15, 2014
CVE-2014-3566: From BEAST to POODLE (or dancing with BEAST)
October 14, 2014
What Do Arista, FireEye, FlowTraq, IBM Security, Ping Identity, RSA, Symantec, Vectra, Venafi, and Webroot Have in Common?
September 26, 2014
Shellshock Bug: When a Perfect 10.0 Score Is Not So Perfect
August 5, 2014
Encryption: What You Can’t See Can Hurt You
June 6, 2014
Just When You Thought It Was Safe to Use SSL
June 6, 2014
2014 World Cup Brings DDoS Attacks to Brazil
April 10, 2014
Avoiding the Next SSL Vulnerability Outbreak: A10’s Investment in SSL Security
April 9, 2014
A10 Products Not Vulnerable to OpenSSL CVE-2014-0160 (Heartbleed)
March 22, 2013