Blog

DDoS Attacks: A Closer Look, Part 1

April 20, 2016

Track:  Technical

Author: Martin Stone, Principal Sales Engineer, NSFOCUS

DDoS Attacks

If you’ve ever seen portrayals of DDoS attacks in TV and movies, they might seem like scary, mysterious attacks, launched by elite hackers, against which there is no protection. Nothing could be farther from the truth.  DDoS is one of the simplest and easiest ways to attack an online system, within reach of almost anyone with a little information and a little money. Fortunately, these attacks are also easy to defend against if you’re prepared and have the right equipment in place. Here are a few of the most popular DDoS attacks that have evolved over time and are still in use today: (more…)

DDoS – Motivations for the Madness, Part 2

March 28, 2016

Track: General Security

Author: Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS

DDoS motivationsIn an earlier blog post I described some of the threat actors and the motivations that often fuel DDoS attacks.

Continuing with this theme, another prominent motivation reared its ugly head in the late 2000s.  Cyber hacktivism, as it is called today, is still one of the most observed motivations for DDoS attacks.  People who claim to have a substantiated reason for launching attacks, based upon their personal, social, moral, or political agenda, launch attacks daily against a host of helpless victims.  The reasons behind the attacks can be based on just about anything that someone doesn’t like.  One recent example was an attack on Nissan from a group protesting Japan’s stance and policies with respect to Marine life. (more…)

DDoS – Motivations for the Madness, Part 1

March 21, 2016

Track: General Security

Author: Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS

DDoS motivationsMost people know that launching a DDoS attack is illegal in just about every country in the world. However, breaking the law or the penalties that go along with it, have not slowed the growth or frequency of DDoS attacks.  Most companies who track DDoS attacks globally, all report the problem is growing, day-by-day. Just about every organization connected to the Internet is concerned about this cyber attack vector, and the motivations for these attacks vary widely.  (more…)

DDoS Attacks and the Cloud: How the Hybrid Approach Answers Emerging Concerns

March 9, 2016

Track:  Technical

Author: Ivan Tirado, Principal Sales Engineer, NSFOCUS

Cloud DDoSPure play cloud DDoS mitigation services have seen explosive growth. The market has grown from small outfits protecting online gambling operations, to what is now an accepted approach at large banks and global enterprises in all verticals.

However, as the customer population expands, the set of needs diversifies. Many of these new customers have not experienced a true DDoS attack. (more…)

DDoS – Best option to get the job done!

February 26, 2016

Track:  Technical

Author: Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS

ddos defense In the world of getting from one place to another, people face a common dilemma.  What transportation will get them to their destination quickly, safely, and affordable? While nearly everyone would enjoy cruising around in a luxury car, most people are just looking for the best option to get the job done.  Something that is reliable, efficient, easy to operate, and affordable. No one likes paying too much. Interestingly enough, a parallel can be drawn in the context of DDoS defenses and the solutions NSFOCUS provides to the cyber-security community. (more…)

Building a better defense – tech, people, process

February 17, 2016

Track:  Technical

Author: Vann Abernethy, Field CTO, NSFOCUS

matrix-69681_1920When thinking about how to best to protect an environment, most non-security people tend to focus on the latest whiz-bang tools and threats that get mainstream media attention.  Truly effective security, however, starts with understanding the environment that you are protecting, and wrapping policy, process, tech and finally people around that. (more…)

The managed services opportunity – from commodity provider to valued partner

February 10, 2016

Track:  Business

Author: Dave Martin, Director of Product Marketing, NSFOCUS

Secretarial-and-bookkeeping-singapore

Network connectivity has become a commodity business.  Business internet access once priced at $500 per month for 1.5 Mbps is now available for half of the cost at almost 70x the capacity.  While this is great for consumers, pure play service providers often struggle to maintain profitability and grow revenue in the face of increased competition. (more…)

The Heart of NSFOCUS

January 28, 2016

Track:  Technical

Author: Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS

heart-583895_1920In my last blog, I wrote about traveling to Las Vegas to attend the NSFOCUS International Business Division (IBD), 2016 Sales Kickoff.  The event was a complete success and I had an opportunity to spend four days with some of the smartest and most successful individuals in our industry.   People from all over the world attended, and I have never seen such a mix of nationalities and cultures represented in our meetings and dinners.  During the event, I witnessed the most kindhearted act of my career. (more…)

Doing It Better

January 21, 2016

Track:  Technical

Author: Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS

arrow-945254_1920

Flying at 40,000 feet above the ground always gives one a sense of clarity.  Looking down on the world from such a height can make a person feel somewhat insignificant.  However, my trip today is very noteworthy.  I will be landing in Las Vegas in a few hours and the next four days will be filled with excitement, entertainment, and education.  I am not going to Vegas for the adult playground activities like many of my fellow passengers.  I am going there to attend the most exciting event of my career; the 2016 Sales Kickoff for a widely-unknown company in the U.S. called NSFOCUS IB. (more…)

Anatomy of an attack: network bandwidth exhaustion

January 5, 2016

Track:  Technical

Author: Vann Abernethy, Field CTO, NSFOCUS

notebook-1071777_1920DDoS attacks come in three basic flavors:  network-layer, application-layer and a hybrid of the two.  This is a somewhat simplistic view but when you look at the strategy for taking someone down via DDoS, the two primary vehicles are either exhaustion of available network bandwidth or the overwhelming of back-end processing power (which can be directed either at the server system itself or the applications residing on them).  The most efficient approach to take down a target will depend on the target itself.  This is why it is important for every company to consider all of the assets that could become targets when designing anti-DDoS protection.  (more…)