• |

A10 Blog

/

Cyber Security

Select a category

  • 5G

  • A10 News

  • Cloud & Networking

  • Cyber Security

  • Events

  • Glossary

  • Network Management

  • Network Security

  • Network Traffic

  • Open Source

  • Technical Articles

Select Author

  • All Authors

  • A10 PSIRT Team

  • A10 Staff

  • Ahmad Nassiri

  • Akshay Mathur

  • Almas Raza

  • Amar Kapadia

  • Andrew Hickey

  • Arshad Khan

  • Babur Khan

  • Bruna Wells

  • Chris White

  • Derek Kang

  • Dhrupad Trivedi

  • Donald Shin

  • Geoff Blaine

  • George Nikaido

  • Gunter Reiss

  • Jeffrey Hughes

  • Jessica Dimaro

  • Jian Liu

  • Jim Frey

  • Kamal Anand

  • Karin Gilles

  • Ken Ludeman

  • Konstantin Dunaev

  • Leah McLean

  • Lee Chen

  • Michael Wheeler

  • Mike Thompson

  • Paul Harms

  • Paul Nicholson

  • Ravi Raj Bhat

  • Rex Chang

  • Rich Groves

  • Robert Keith

  • Sanjai Gangadharan

  • Saurabh Sureka

  • Siddhartha Aggarwal

  • Simon Jackson

  • Steve Hotz

  • Subeh Sharma

  • Sudarsan Raghavan

  • Takahiro Mitsuhata

  • Tarun Aggrawal

  • Terry Young

  • Tracy Schriver

  • Wendi Wolfgram

  • Yasir Liaqatullah

March 25, 2020

Curing Healthcare Cybersecurity - A Better Way To Protect Patient Data

The Hippocratic Oath commands doctors to “first, do no harm.” Healthcare professionals have a proud tradition of honoring this commitment to their patients—but in today’s data-centric world, they face an equal obligation to secure the Protected Health Information (PHI), Personally Identifiable Information (PII), and financial data of their patients as well. And ironically, one of…

March 19, 2020

Security in a Multi-cloud Environment

Vigilance and Responsibility Required for Multi-cloud Secure Application Delivery As companies leverage a multi-cloud strategy to improve IT operations and provide better services to their customers, they can’t afford to overlook the implications for security. This is especially true with the emergence of a new paradigm to run multiple disparate compute environments for application delivery.…

March 18, 2020

What You Need to Know About DDoS Weapons Today

A DDoS attack can bring down almost any website or online service. The premise is simple: using an infected botnet to target and overwhelm vulnerable servers with massive traffic. Twenty years after its introduction, DDoS remains as effective as ever—and continues to grow in frequency, intensity, and sophistication. That makes DDoS defense a top cybersecurity…

March 6, 2020

Jim Brisimitzis on 5G, Edge Computing and AI

In the “5G: Secure What Matters” blog post series, we showcase thought leaders and their unique perspectives on the intersection of 5G, security, and technology. We recently sat down with Jim Brisimitzis, the founder of Seattle’s 5G Open Innovation Lab, to get his views on 5G. Tell us about yourself? I’m the founder of Seattle’s…

March 5, 2020

Enabling DNS over HTTPS (DoH) with Thunder CFW

Encryption is the foundation for securing data on the internet. Encrypted HTTP (HTTPS) has one of the largest shares of traffic on the internet today and is now the de facto standard. Domain Name Server (DNS) traffic, however, has been a clear-pass unencrypted channel on the internet. DNS, defined in the simplest terms, is used…

February 27, 2020

McAfee and A10 Networks Secure the Network Edge Against Modern Attacks

McAfee recently announced updates to their partnership program, particularly, the McAfee Security Innovation Alliance (SIA). With SIA, customers can benefit from highly interoperable and integrated security solutions that work together to provide a better defense against rising, and evolving, cyber-attacks. A10 Networks, with its Thunder SSLi® (SSL Insight) solution, has joined the McAfee SIA program,…

February 26, 2020

Security Has Finally Arrived with 5G

SK Telecom has achieved another “first” in 5G When SK Telecom announced its “5GX” in 2018, it identified four distinct components to its value proposition – speed, latency, stability, and security. This is a remarkable shift from how mobile operators have traditionally differentiated themselves. Speed and reliability have been the cornerstone of most mobile operator…

February 20, 2020

Automation that Matters and Eliminates “Fat Finger” Errors

Operators consider network complexity to be the greatest threat for the next three years, according to a research survey by 451 Research. At 61 percent of respondents, this ranks higher than competition from cloud providers or concerns about the pressure on service margins and lower operating costs. Greatest Threat for the Next Three Years  …