Network Security Archives | A10 Networks
  • |

A10 Blog


Network Security

Select a category

  • 5G

  • A10 News

  • Cloud & Networking

  • Cyber Security

  • Events

  • Glossary

  • Network Management

  • Network Security

  • Network Traffic

  • Open Source

  • Technical Articles

Select Author

  • All Authors

  • A10 PSIRT Team

  • A10 Staff

  • Ahmad Nassiri

  • Ahmed Abdelhalim

  • Akshay Mathur

  • Almas Raza

  • Amar Kapadia

  • Andrew Hickey

  • Arshad Khan

  • Babur Khan

  • Bruna Wells

  • Chris White

  • Derek Kang

  • Dhrupad Trivedi

  • Donald Shin

  • Gennady Dosovitsky

  • Geoff Blaine

  • George Nikaido

  • Gunter Reiss

  • Jeffrey Hughes

  • Jessica Dimaro

  • Jian Liu

  • Jim Frey

  • Kamal Anand

  • Karin Gilles

  • Ken Ludeman

  • Konstantin Dunaev

  • Leah McLean

  • Lee Chen

  • Michael Wheeler

  • Mike Thompson

  • Paul Harms

  • Paul Nicholson

  • Ravi Raj Bhat

  • Rex Chang

  • Rich Groves

  • Robert Keith

  • Sanjai Gangadharan

  • Saurabh Sureka

  • Shingo Takagi

  • Siddhartha Aggarwal

  • Simon Jackson

  • Steve Hotz

  • Subeh Sharma

  • Sudarsan Raghavan

  • Takahiro Mitsuhata

  • Tarun Aggrawal

  • Terry Young

  • Tony Griffen

  • Tracy Schriver

  • Wendi Wolfgram

  • Yasir Liaqatullah

July 27, 2020

Five Most Famous DDoS Attacks and Then Some

Distributed Denial of Service (DDoS) attacks are now everyday occurrences. Whether you’re a small non-profit or a huge multinational conglomerate, your online services—email, websites, anything that faces the internet—can be slowed or completely stopped by a DDoS attack. Moreover, DDoS attacks are sometimes used to distract your cybersecurity operations while other criminal activity, such as…

October 29, 2018

Six Steps to Defend Against DDoS Attacks

In the first half of this article, Understanding DDoS Attacks, we talked about the nuts and bolts of DDoS attacks. Here, we'll discuss how you can take practical steps to protect your organization from the devastation of DDoS. More than 80 percent of companies experiencing at least one DDoS attack in 2017. It's no longer…

September 25, 2018

Understanding DDoS Attacks

It’s clear the DDoS attacks aren’t going anywhere — in Q2 2017, the number of attacks increased significantly compared with the same quarters in 2015 and 2016, according to a report Q2 2017 DDoS Attack Trends Report from CDNetworks. [caption id="attachment_20566" align="aligncenter" width="612"] Number of DDoS Response Times by Month in the Q2 of Each…

August 14, 2018

IoT and DDoS: Cyberattacks on the Rise

The Internet of Things (IoT) may be a relatively new type of network, but it's already seeing soaring adoption rates with no signs of stopping. In fact, IoT spending is expected to reach $267 billion by 2020. However, IoT is not without its drawbacks: IoT devices are a common weapon in enormously destructive Distributed Denial…

July 16, 2018

How to Defend Against Amplified Reflection DDoS Attacks

What are Amplified Reflection DDoS Attacks? Amplified reflection attacks are a type of DDoS attack that exploits the connectionless nature of UDPs with spoofed requests to misconfigured open servers on the internet. Amplified reflection attacks take the prize when it comes to the size of the attack. The attack sends a volume of small requests with…

March 6, 2018

For Enterprise DDoS Defense, Cloud Alone Just Doesn't Cut It

Enterprises face a dilemma when it comes to defense against today’s modern DDoS attacks: trust the surgical precision of an on-premise DDoS protection solution or go with a DDoS cloud scrubbing solution. Why choose?  Why not get the best of both worlds and go with a full spectrum hybrid DDoS defense solution that combines both?…

February 1, 2018

Three Misconceptions of Breaking and Inspecting SSL Traffic

There are a lot of misconceptions about breaking and inspecting SSL traffic. So much so that some companies elect to go without the ability altogether. In this video, A10 Senior Federal Lead SE James Schweitzer separates fact from fiction when it comes breaking and inspecting encrypted traffic and highlights the benefits of a dedicated SSL/TLS…

January 17, 2018

DDoS Protection Demands a Hybrid Approach

Picture this: a DDoS attack is crushing your network. Your enterprise’s internet pipe is under siege and almost to capacity. There’s nowhere else for traffic to go, making it impossible for legitimate user traffic to get through. What’s the result? The attack is successful. Your network or services fall down. You lose productivity and revenue.…