• |

A10 Blog


Cyber Security

Select a category

  • 5G

  • A10 News

  • Cloud & Networking

  • Cyber Security

  • Events

  • Glossary

  • Network Management

  • Network Security

  • Network Traffic

  • Open Source

  • Technical Articles

Select Author

  • All Authors

  • A10 PSIRT Team

  • A10 Staff

  • Ahmad Nassiri

  • Akshay Mathur

  • Almas Raza

  • Andrew Hickey

  • Arshad Khan

  • Babur Khan

  • Bruna Wells

  • Chris White

  • Derek Kang

  • Donald Shin

  • Dr. Vincent Berk

  • Geoff Blaine

  • George Nikaido

  • Gunter Reiss

  • Jeffrey Hughes

  • Jim Frey

  • Kamal Anand

  • Karin Gilles

  • Leah McLean

  • Lee Chen

  • Michael Wheeler

  • Mike Thompson

  • Paul Harms

  • Paul Nicholson

  • Ravi Raj Bhat

  • Rex Chang

  • Rich Groves

  • Robert Keith

  • Sanjai Gangadharan

  • Siddhartha Aggarwal

  • Simon Jackson

  • Steve Hotz

  • Subeh Sharma

  • Takahiro Mitsuhata

  • Tarun Aggrawal

  • Terry Young

  • Tracy Schriver

  • Wendi Wolfgram

  • Yasir Liaqatullah

August 15, 2019

GTP and The Evolution of Roaming

Mobile traffic using GPRS Tunneling Protocol (GTP) has exploded over the last couple years, largely due to elimination of international roaming price barriers that previously discouraged subscribers from using the service. Global international roaming traffic – voice and data – is expected to grow 32X by 2022 and to reach over 1.5 Mb per subscriber…

August 14, 2019

The State of DDoS Weapons, Q2 2019

DDoS attacks continue to grow in frequency, intensity and sophistication. However, the delivery method--using infected botnets and vulnerable servers to perform these attacks--remains the same. That said, we are seeing some new attack threats on the horizon in IoT and 5G. Read on to learn more. Where DDoS Attacks Are Originating Although DDoS weapons are…

August 13, 2019

The Top 7 Requirements for Optimized Traffic Flow and Security in Kubernetes

According to a 2018 survey from Portworx, four out of five enterprises are now running containers, and 83 percent are running them in production. Given that only 67 percent were doing so in 2017, it’s clear that containers are more than a fad. With containers’ newfound popularity, though, some companies are struggling to establish an…

August 12, 2019

What Service Providers (and Enterprises) Need to Know About DDoS Scrubbing Services

There are a number of considerations that service providers must make when implementing DDoS scrubbing services for their subscribers. In general, those considerations fall into three categories: business, technical and economic. In this article, we’ll cover all three of those categories. You’ll learn about: Business Considerations - DDoS Trends Technical Considerations - DDoS Defense Deployment…

July 30, 2019

Mayors of America, Beware! – Ransomware is coming to town

Ransomware attacks have been around for a long time. We saw a huge spike in ransomware attacks, and the resulting damages, from 2016 to 2017, including the devastating WannaCry attack of 2017 that cost organizations as much as $4 billion in damages. There was a slight lull in ransomware activities in the 2018 but in…

July 29, 2019

Beat Gaming Cheaters and DDoS Spoilers with Real-time Packet Watermarking

Gaming, for entertainment or gambling, seems to bring out the worst in the worst people. Cheaters leverage an ecosystem of nefarious tool developers to get a competitive edge with new ways to unfairly advance, obstruct competitors, or attack the hosting platforms. How prevalent is the problem? A study by Irdeto provides some interesting insights into…

July 24, 2019

How Zones Facilitate a Proactive DDoS Defense that Protects Real Users

The primary objective of DDoS defense is to ensure availability of services to legitimate users. Secondarily, protecting the service's infrastructure from being overwhelmed aligns with safeguarding a user's access. Sometimes, DDoS defenders miss the nuances of this priority because IT gets graded on a measurable five-nines uptime, but rarely on user experience. When the user…

July 22, 2019

5G is About to Change the World. Here’s How it Works

5G at a Glance Several aspects of 5G technology allow mobile operators to create a faster, larger network than ever before while maintaining lower latency than was previously possible. Just how fast are we talking? Up to 20 gigabits per second downlink speed, compared to 4G/LTE’s maximum speed of 150 megabits per second. Here’s a…