- Written by Kevin Whalen
Is anything more annoying than a group of people getting together to congratulate themselves, who have for years let down their customers? The arrogance, the detachment from reality and the lack of focus on what they’re really supposed to be doing, well it just doesn't stop them or even slow them down. They practically dislocate their arms slapping each other on the back and telling each other how wonderful they are.
No, I’m not talking about the RSA Conference, but the Academy Awards.
As a genre, cyber security movies just aren't very good in my opinion. Curt Wilson of Arbor’s Security Engineering & Response Team joined me to discuss the genre, the good, the bad and the ugly.
- Written by Arbor Networks
Ten years of research. Ten years of insight from those who work on the front lines of the operational security community. This year marks a decade of Arbor surveying its customers on the challenges they face on a daily basis. The report was once dominated by service providers, but over time, as Arbor has grown into the enterprise and other markets, so too have the respondents to the report.
Today, the breadth of the report covers network operators across provider, enterprise, government and education sectors. The number of respondents has grown from 36 to 287 today. While some things have changed greatly, mostly related to the threat landscape, many things remain the same. On the operational side, staffing, budget and process challenges have remained stubbornly consistent. Needless to say, it has been an amazing experience tracking the changes and challenges facing network operators around the world.
We asked the four authors of the Worldwide Infrastructure Security Report to share the data point(s) that stood out the most from the survey data published in the tenth annual report. You can read their thoughts in the latter half of this blog post.
- For an overview of key findings, read our press release here
- To review the full report, download it here (registration required)
- Download infographics and select charts from this years' report on our Pinterest page or download the presentation of key findings at Slideshare
- For a deeper dive into the key findings, join our webinar later this week, on January 29 at 11am ET – report author and Director of Solutions Architect Darren Anstee, will discuss report findings and implications for network operators both now and going forward.
- Written by Jennifer Glenn
Earlier this month, the New York Times published an article about President Obama’s proposed legislation for a “30- day shot clock” which mandates that companies must alert customers about a security breach within 30 days of discovery. The idea behind the legislation is that it is a step in the right direction to ensure customer privacy – this is a noble idea, but how much will this really help?
- Written by Arbor Networks
Three weeks later, the Christmas DDoS attacks against the popular Xbox and Playstation gaming platforms continues to generate headlines. Over the weekend, the BBC reported,
"A UK man has been arrested as part of an investigation into denial-of-service attacks on Sony Playstation and Xbox systems over Christmas.
The 18-year-old was arrested at an address in Southport, near Liverpool.
He is accused of unauthorised access to computer material and knowingly providing false information to law enforcement agencies in the US.
The investigation was a joint operation between UK cybercrime units and the Federal Bureau of Investigation (FBI)."
Given the continued interest in this story, we decided to speak with someone on the front lines of this attack. An 11 year old boy who got an Xbox for Christmas. Enjoy.