Author: Ben Fischer

How ATLAS Enriches Arbor’s WISR

Next week Arbor Networks celebrates the release of the 12th edition of its popular Worldwide Infrastructure Security Report (WISR), which is primarily based upon a survey of individuals within the operational security community from a variety of business verticals from across the globe. The survey […]

Read more

“It will never happen to me…”

Have you ever said or heard someone say “that will never happen to me” or “I do not have to worry about that”? Risk analysis on a personal level. What risk is worth taking? What potential downside is worth protecting against, despite a relatively low probability of something […]

Read more

DDoS Attacks Raise the Bar for Service Providers

When your infrastructure or customers are under a DDoS attack, every second counts.  As we’ve illustrated in our 9th annual Worldwide Infrastructure Security Report: DDoS attacks are increasing in size; DDoS attacks are frequently multi-vector; and security operations (OPSEC) teams are struggling with headcount and resources. Aside from the fact that DDoS attacks are happening more frequently, they are bigger and more complex, which requires expert staff equipped with the best tools to combat these threats. 

Read more

The Danger of the Latest NTP Attacks

Who would have imagined that Network Time Protocol (NTP) — such an innocuous protocol designed to synchronize the clock on your laptop, smartphone, tablet, and network infrastructure devices — would be abused to cause so much damage?  NTP reflection/amplification DDoS attacks are the current weaponized DDoS technique of choice for DDoS attacks, especially those 1 Gb/sec and larger – with some now exceeding 300 Gb/second.  Attacks of 100 Gb/second have become fairly common, as tools have armed slews of copycat attacks.  Even small DDoS attack volumes are able to impact availability and disrupt the performance of servers, applications, or services that are brittle, fragile and non-scalable.  Large attacks generate significant collateral damage en route to their target due to their extreme bandwidth consumption on ISP networks and at their various interchange points.

Read more