Skip to main content Skip to search
Get a Free Trial
Blog

About A10 Staff

A10 Staff
A10 Staff


Recent Posts By the Author

March 12, 2026

Attackers Hit Brazil's Regional ISPs; Telcos the #1 DDoS Target Globally

17,527 DDoS attacks in six days. Five small ISPs. A pattern that signals a fundamental shift in how attackers choose their targets. Something…

September 23, 2025

Employee Q&A: Cutting-edge Technology, Strong Culture of Collaboration

Responses by Ozgur Tufekci, graduate of University of Illinois at Urbana-Champaign in Computer Engineering What Does Your Typical Day Look Like? A typical…

September 22, 2025

Employee Q&A: Financial Stability with a Startup-like Environment

Responses by Sean Brynjólfsson, graduate of Cornell University in Computer Science What Does Your Typical Day Look Like? I start out by steeping…

AI

August 28, 2025

Guest Q&A: AI-powered Fraud Attacks and Data Security are Key Challenges for SecOps

Responses by Adnan Khan, chief architect and senior director of data analytics and AI platforms at Visa Tell us about yourself With over…

August 12, 2025

DDoS Threat Map Shows Global Distribution of Top Amplifier Weapons and Bots

A10 Networks has provided updated data on its threat map, highlighting, by country, the top amplification weapons and total bots/drones found in the…

July 31, 2025

Millions of DDoS Weapons Used for Volumetric and Sophisticated Attacks

In the recently published DDoS weapons report, A10 Networks describes the geographic and organizational concentration of the 12.3 million bots and amplifiers—the weapons…

AI

July 17, 2025

Guest Q&A: Security Leadership in the Age of AI and Multi-cloud

Responses by Saikat Maiti, CEO and Founder of nFactor Technologies Tell us about yourself I'm the CEO and Founder of nFactor Technologies, where…

May 29, 2025

What are Zero Trust APIs?

Over the past few years, APIs have become an integral part of virtually every digital platform. Gartner reports that APIs are at the…

May 20, 2025

Credential Stuffing: Examples, Detection and Impact

Credential stuffing has become one of the most common and significant threats facing organizations today and is a risk for virtually any application…

May 15, 2025

How to Secure APIs – 10 Best Practices to Follow

Application programming interfaces (APIs) are a foundation for modern software development. They simplify the development process by providing a wealth of functionality and…