• |

A10 Blog


Cyber Security

Select a category

  • 5G

  • A10 News

  • Cloud & Networking

  • Cyber Security

  • Events

  • Glossary

  • Network Management

  • Network Security

  • Network Traffic

  • Open Source

  • Technical Articles

Select Author

  • All Authors

  • A10 PSIRT Team

  • A10 Staff

  • Ahmad Nassiri

  • Akshay Mathur

  • Almas Raza

  • Amar Kapadia

  • Andrew Hickey

  • Arshad Khan

  • Babur Khan

  • Bruna Wells

  • Chris White

  • Derek Kang

  • Donald Shin

  • Dr. Vincent Berk

  • Geoff Blaine

  • George Nikaido

  • Gunter Reiss

  • Jeffrey Hughes

  • Jessica Dimaro

  • Jim Frey

  • Kamal Anand

  • Karin Gilles

  • Ken Ludeman

  • Konstantin Dunaev

  • Leah McLean

  • Lee Chen

  • Michael Wheeler

  • Mike Thompson

  • Paul Harms

  • Paul Nicholson

  • Ravi Raj Bhat

  • Rex Chang

  • Rich Groves

  • Robert Keith

  • Sanjai Gangadharan

  • Saurabh Sureka

  • Siddhartha Aggarwal

  • Simon Jackson

  • Steve Hotz

  • Subeh Sharma

  • Takahiro Mitsuhata

  • Tarun Aggrawal

  • Terry Young

  • Tracy Schriver

  • Wendi Wolfgram

  • Yasir Liaqatullah

October 3, 2019

DDoS Attacks on Carrier-grade NAT Infrastructure

A10 Networks has produced a series of LightTalk videos in which company solutions architects explain a technical concept such as the evolution to containers, SYN cookies or, in this case, how DDoS attacks affect carrier-grade NAT infrastructure. In this video, our solutions architect describes what happens when an attack is initiated using a single IP…

October 2, 2019

What are SYN Cookies and How are they Used?

A10 Networks has produced a series of LightTalk videos in which company solutions architects explain a technical concept such as containers, SYN cookies and hybrid DDoS clouds. In this video, Solutions Architect, Syed Danial Zaidi, describes what SYN cookies are and how they help DDoS defense solutions and load balancers protect against SYN flood attacks.…

September 26, 2019

Hybrid DDoS Cloud

A10 Networks has produced a series of LightTalk videos in which company solutions architects explain a technical concept such as containers, SSL inspection in Layer 2, and this topic, hybrid DDoS cloud. In this video, Solutions Architect, Ahmad Nassiri, explains what Hybrid DDoS is and the advantages of hybrid over pure cloud. These include lower…

September 24, 2019

Online Gaming Needs a Zero-Trust DDoS Defense

New Rules of the Game: Only the Trusted May Enter DDoS attackers continue to innovate so leaving your digital front door open and waiting to react against a DDoS attack just doesn’t cut it anymore. Adrenaline-fueled gaming platform operators need to apply zero-trust principles. The concept of zero trust, which was developed by former Forrester…

September 23, 2019

Klein Independent School District Enhances Security with High-performance SSL/TLS Decryption

Sixty-three percent of K-12 educators use technology in the classroom daily with laptops and computers being the most commonly used. It should come as no surprise that schools with the heaviest focus on technology--like those that make up the Klein Independent School District (ISD) in Texas--are starting to turn an eye towards security. The school…

September 17, 2019

Insights Around the Journey to 5G

Security remains a top concern of mobile operators as they make the journey to 5G. At the recent, Big 5G event in Denver, Colo., A10 Networks shared its insights around how important security will become for 5G networks. For instant access to the “Big 5G Event Critical Insight eBook,” click here By 2024, 5G networks…

September 16, 2019

Leaseweb Sees Customer Loyalty Skyrocket with Advanced DDoS Scrubbing and Intelligent Automation

In 2018, the GitHub DDoS attack made headlines with record-breaking traffic clocking in at 1.35 terabits per second, or 129.6 million packets per second. That record was short-lived. In the first month of 2019, Imperva reported a DDoS attack of 500 million packets per second. With this in mind, it’s easy to see why global…

September 5, 2019

Yikes! Another DDoS Weapon, WS-Discovery Amplification Attacks

Web Services Dynamic Discovery Services Weaponized for DDoS Reflected amplification attacks continue to be the DDoS attacker’s weapon of choice. From an attacker’s perspective, that makes sense because there is no malware to develop or intrusion involved in exploiting someone else’s computing and networking capabilities. Simply, spoof your victim’s IP address as the requester and…