Arbor Insight:
Our people, products & perspective

Topics Trending in Cyber Security, DDoS, and Advanced Threat Detection

image description

How DDoS Disrupted Elections In Czechia

As DDoS attacks grow in frequency and bandwidth each year, detection and proactivity become crucial to maintaining system functionality on both back-end structures and front-end user interfaces. In the case of political elections, keeping polling up and running can mean the difference between fair democratic processes and skewed election results. In today’s shall we say ‘tempestuous’ international climate, clarity in how we choose our world leaders is paramount. Unfortunately, cyberattacks that impede this goal are only too common.

Read more

NETSCOUT Arbor Publishes 13th Annual Worldwide Infrastructure Security Report

Today we are pleased to release our thirteenth annual Worldwide Infrastructure Security Report (WISR). The report offers direct insights from network, security, and operations professionals at global network operators including service provider, cloud and enterprise organizations. The report covers a wide range of topics, from DDoS attacks to key organizational issues such as incident response training, staffing and budgets. Its focus is on cyber threats, risks, and strategies to address them.

Read more

The Rise of Connected Devices (And the Security Risks that Follow)

It’s no secret that the Internet of Things (IoT) is becoming more a part of our lives on a daily basis. Connected devices, such as webcams, smart TVs and CPE devices, are not exactly “new” – in fact, in 1991, research teams at the University of Cambridge used an IP-enabled webcam to monitor when the coffee supply in their coffee machines was running low. However, since that revolutionary coffee monitor was invented almost 30 years ago, the number of connected devices has exponentially increased, already outnumbering the total number of humans on the planet. Industry analysts estimate the number of connected devices to be 50 billion by 2020. Unfortunately, as the number of these devices increases, so do the security risks.

Read more