DDoS Attacks: What Happened And What We Should Do About It

The security community has been watching the DDoS threat grow to incredible levels. DDoS attacks are up 75% over last year. Over 30% of attacks reach sustained peaks of over 10 Gbps, an amount that will swamp most every business user. Some very large attacks have gone as high as 600 Gbps, a size that […]

What Business Users Should Do To Mitigate DDoS Threats

Businesses have long known of the threats of DDoS to their operation, and the security community has been watching this threat evolve to the point where we all need to take collective action to prevent attack. Businesses of every size need to know what devices you have and what you have them for. This gets […]

What Home Users Should Do to Mitigate DDoS Threats

We have all been watching Distributed Denial of Service (DDoS) attacks evolve and the bad news is that your home may very well have been involved in recent attacks. Bad guys use automated tools to scan and probe for devices they can take over and they don’t care anything about your desires in the matter. […]

TechNet Augusta 2016: US Army Networks and Services

This is the second in our series of posts on US Army systems and mission needs based on the AFCEA Augusta Technet. The first was an overview you can find at: TechNet Augusta 2016 “Cyber in the Combined Arms Fight” Networks and Services.  The Army is emphasizing the “convergence of their lines of effort” to achieve […]

Verisign: Security Services

With this post we are initiating coverage of Verisign (NASDAQ: VRSN). Many in the technology community know Verisign for their domain name registration heritage and their operation of the .com, .net, .edu and .gov top level domains. Verisign has successfully operated the .com DNS infrastructure for almost 18 years without an outage. This feat alone […]

Accelerated PCAP: An Architecture for Precision Packet Capture and Analysis on High-­‐Speed Networks

Are you a system engineer or administrator charged with protecting your network infrastructure from attack?  Napatech’s Field Programmable Gate Arrays (FPGAs) can help you to improve on the ability to monitor and react to malicious events that occur within your network.  These FPGA-based accelerators are capable of performing high-speed packet capture and replay at speeds from 1 […]