Last week, a group of us from Arbor attended Gartner’s Security and Risk Management Summit in National Harbour, MD, near Washington DC. The summit featured an amazing number of Gartner analysts, security practitioners, CISO’s, and vendors over three and a half days, and it was an excellent opportunity to hear about timely enterprise security topics. From a network security perspective, mobility, cloud, advanced threats, and big data for security were major hot themes.Read more
Topics Trending in Cyber Security, DDoS, and Advanced Threat Detection
Cyber threats – or more specifically, DDoS attacks – are an ever-growing, ever-evolving phenomenon – where today, any company can become a target either directly or indirectly, leaving behind a long-lasting impact beyond simply shutting down services for a period of time. Customer trust can be lost, a company’s brand negatively impacted, and perhaps the most obvious one: lost revenue and profit.Read more
Date: June 12, 2013
Time: 8:00am PT |11:00am ET | 4 pm BSTRead more
Most security vendors are able to offer excellent visibility across customer networks. After all, you can’t protect against threats that you cannot see. What makes the Arbor Networks Active Threat Level Analysis System (ATLAS) so unique and valuable to customers is that not only do we provide visibility about the traffic and threats on their own network, but we can do it across the Internet itself.Read more
Fueled by their subscribers’ insatiable demand for smarter mobile devices and multimedia content, mobile network operators (MNOs) have seen tremendous growth in mobile traffic on their networks. Along with this growth, MNOs face the ever-increasing challenge of maintaining the availability and performance of their mobile network and services to enhance their customers’ quality of experience.
However, not all threats to the availability and security of mobile networks are created equally. This is a big topic for us, particularly this week as we head to CTIA in Las Vegas (booth #4018) where we look forward to talking to MNOs who struggle with this growing issue.Read more
For full details on the current Internet outage in Syria, please visit the ASERT blog for insight from Darren Anstee: https://arbornetworks.com/blog/asert/syria-taken-offline/
Our mission as an organization is to not only provide the best-in-class research needed to help our customers detect and mitigate network-based threats, but to also arm customers with the right set of training and educational services needed to maximize their investment in our products and solutions. We accomplish this by offering highly technical and effective task-based training using real-world DDoS attack scenarios and hands-on practical exercises. Courses include a simulated network lab environment which provides a real-world configuration and DDoS attack response experience and our training is customized based upon specific customer configurations and/or job functions.Read more
In part 2 of this Q&A, Carlos Morales and BankInfoSecurity’s Tom Field discuss new strategies and solutions for defending your organization from the ever-evolving DDoS attack. You can read part 1 here.Read more
DDoS attacks on banks have returned, and attackers are changing their tactics and expanding their attack toolsets. How must organizations change the way they defend against DDoS? Arbor Networks’ Carlos Morales discusses the evolving threat landscape with Tom Field of BankInfoSecurity in the following Q&A.
Part 1 of this Q&A is below; part 2 will appear tomorrow.Read more
**Updated on 4/26 with infographic**
Q1 2013 saw the previous record for the largest reported DDoS attack, around 100Gbps, shattered by the 300Gb/sec DNS reflection / amplification attack which targeted Spamhaus. Attackers have had the technical capability to generate attacks of this magnitude for some time, and now this has been demonstrated. The attack vector used in this case was not new, DNS reflection / amplification has been used to generate several of the largest attacks seen on the Internet in recent years. DNS reflection / amplification attacks are actually relatively common, but usually at much lower traffic levels.Read more