• |

A10 Blog

/

Network Security

Select a category

  • 5G

  • A10 News

  • Cloud & Networking

  • Cyber Security

  • Events

  • Glossary

  • Network Management

  • Network Security

  • Network Traffic

  • Open Source

  • Technical Articles

Select Author

  • All Authors

  • A10 PSIRT Team

  • A10 Staff

  • Ahmad Nassiri

  • Akshay Mathur

  • Almas Raza

  • Amar Kapadia

  • Andrew Hickey

  • Arshad Khan

  • Babur Khan

  • Bruna Wells

  • Chris White

  • Derek Kang

  • Donald Shin

  • Geoff Blaine

  • George Nikaido

  • Gunter Reiss

  • Jeffrey Hughes

  • Jessica Dimaro

  • Jian Liu

  • Jim Frey

  • Kamal Anand

  • Karin Gilles

  • Ken Ludeman

  • Konstantin Dunaev

  • Leah McLean

  • Lee Chen

  • Michael Wheeler

  • Mike Thompson

  • Paul Harms

  • Paul Nicholson

  • Ravi Raj Bhat

  • Rex Chang

  • Rich Groves

  • Robert Keith

  • Sanjai Gangadharan

  • Saurabh Sureka

  • Siddhartha Aggarwal

  • Simon Jackson

  • Steve Hotz

  • Subeh Sharma

  • Takahiro Mitsuhata

  • Tarun Aggrawal

  • Terry Young

  • Tracy Schriver

  • Wendi Wolfgram

  • Yasir Liaqatullah

October 29, 2018

How to Defend Against DDoS Attacks: Six Steps

In the first half of this article, Understanding DDoS Attacks, we talked about the nuts and bolts of DDoS attacks. Here, we'll discuss how you can take practical steps to protect your organization from the devastation of DDoS. More than 80 percent of companies experiencing at least one DDoS attack in 2017. It's no longer…

September 25, 2018

Understanding DDoS Attacks

It’s clear the DDoS attacks aren’t going anywhere — in Q2 2017, the number of attacks increased significantly compared with the same quarters in 2015 and 2016, according to a report Q2 2017 DDoS Attack Trends Report from CDNetworks. [caption id="attachment_20566" align="aligncenter" width="612"] Number of DDoS Response Times by Month in the Q2 of Each…

August 15, 2018

5 Most Famous DDoS Attacks

DDoS attacks are not only on the rise—they’re also bigger and more devastating than ever before. From independent websites to multinational banks, it seems like no one is immune. In fact, a 2017 report from Cisco found that the number of DD0S attacks exceeding 1 gigabit per second of traffic will rise to 3.1 million…

August 14, 2018

IoT and DDoS: Cyberattacks on the Rise

The Internet of Things (IoT) may be a relatively new type of network, but it's already seeing soaring adoption rates with no signs of stopping. In fact, IoT spending is expected to reach $267 billion by 2020. However, IoT is not without its drawbacks: IoT devices are a common weapon in enormously destructive Distributed Denial…

July 16, 2018

How to Defend Against Amplified Reflection DDoS Attacks

What are Amplified Reflection DDoS Attacks? Amplified reflection attacks are a type of DDoS attack that exploits the connectionless nature of UDPs with spoofed requests to misconfigured open servers on the internet. Amplified reflection attacks take the prize when it comes to the size of the attack. The attack sends a volume of small requests with…

March 13, 2018

GDPR to Put a High Price on Security Breaches

Security breaches are already costly; not just financially, but in terms of brand damage, customer dissatisfaction and downtime. For companies that do business with residents of the European Union (EU), the financial fallout from a security breach is about to get much more expensive. That’s why it’s imperative for organizations to get ready for GDPR…

March 6, 2018

For Enterprise DDoS Defense, Cloud Alone Just Doesn't Cut It

Enterprises face a dilemma when it comes to defense against today’s modern DDoS attacks: trust the surgical precision of an on-premise DDoS protection solution or go with a DDoS cloud scrubbing solution. Why choose?  Why not get the best of both worlds and go with a full spectrum hybrid DDoS defense solution that combines both?…

February 1, 2018

Three Misconceptions of Breaking and Inspecting SSL Traffic [Video]

There are a lot of misconceptions about breaking and inspecting SSL traffic. So much so that some companies elect to go without the ability altogether. In this video, A10 Senior Federal Lead SE James Schweitzer separates fact from fiction when it comes breaking and inspecting encrypted traffic and highlights the benefits of a dedicated decryption…