Blog

Building a better defense – tech, people, process

fevereiro 17, 2016 | NSFOCUS

Track:  Technical Author: Vann Abernethy, Field CTO, NSFOCUS When thinking about how to best to protect an environment, most non-security people tend to focus on the latest whiz-bang tools and threats that get mainstream media attention.  Truly effective security, however, starts with understanding the environment that you are protecting, and wrapping policy, process, tech and finally […]

The managed services opportunity – from commodity provider to valued partner

fevereiro 10, 2016 | NSFOCUS

Track:  Business Author: Dave Martin, Director of Product Marketing, NSFOCUS Network connectivity has become a commodity business.  Business internet access once priced at $500 per month for 1.5 Mbps is now available for half of the cost at almost 70x the capacity.  While this is great for consumers, pure play service providers often struggle to maintain […]

The Heart of NSFOCUS

janeiro 28, 2016 | Adeline Zhang

Track:  Technical Author: Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS In my last blog, I wrote about traveling to Las Vegas to attend the NSFOCUS International Business Division (IBD), 2016 Sales Kickoff.  The event was a complete success and I had an opportunity to spend four days with some of the smartest and most successful individuals […]

Doing It Better

janeiro 21, 2016 | Adeline Zhang

Track:  Technical Author: Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS Flying at 40,000 feet above the ground always gives one a sense of clarity.  Looking down on the world from such a height can make a person feel somewhat insignificant.  However, my trip today is very noteworthy.  I will be landing in Las Vegas in a […]

Anatomy of an attack: network bandwidth exhaustion

janeiro 5, 2016 | NSFOCUS

Track:  Technical Author: Vann Abernethy, Field CTO, NSFOCUS DDoS attacks come in three basic flavors:  network-layer, application-layer and a hybrid of the two.  This is a somewhat simplistic view but when you look at the strategy for taking someone down via DDoS, the two primary vehicles are either exhaustion of available network bandwidth or the overwhelming […]

DDoS attacks – more than just disruption?

dezembro 21, 2015 | NSFOCUS

Track:  General Security Author: Vann Abernethy, Field CTO, NSFOCUS Distributed Denial-of-Service (DDoS) attacks have been around for decades and have been increasing in popularity due to the relative ease in carrying one out.  Traditionally, the purpose of these attacks has been to make a site or service unavailable to its intended users for some duration via […]

Anatomy of an attack – DNS amplification

dezembro 14, 2015 | NSFOCUS

Track:  Technical Author: Vann Abernethy, Field CTO, NSFOCUS DNS amplification attacks ramp up the power of a botnet when targeting a victim.  The basic technique of a DNS amplification attack is to spoof the IP of the intended target and send a request for a large DNS zone file to any number of open recursive DNS […]

The financial impact of DDoS attacks: The devil is in the details

dezembro 7, 2015 | NSFOCUS

Track:  Business Author: Dave Martin, Director of Product Marketing, NSFOCUS Even if you have not yet been the victim of a DDoS attack it is helpful to examine the financial impact of a potential attack on your organization for the purposes of doing risk assessment or for calculating the payback period of a DDoS protection solution.

Modern DDoS attacks: When Moore’s law meets Darwin’s Theory of Evolution

dezembro 4, 2015 | NSFOCUS

Track:  General Security Author: Dave Martin, Director of Product Marketing, NSFOCUS What would happen if you combined Moore’s law with Darwin’s Theory of Evolution and applied them to DDoS attacks?  Unfortunately, modern DDoS attacks seem to embody this idea perfectly as both the frequency and complexity of these attacks have become truly staggering in just a […]

Brains vs. Brawn – Cracking the Seventh Layer

outubro 1, 2015 | NSFOCUS

Author: Rishi Agarwal, Chief Evangelist, NSFOCUS When the news reports on DDoS attacks, it is generally referring to large-scale network attacks that are focused on Layer 3 and 4 of the network stack. However, from a mitigation point of view, network layer attacks are not sophisticated. The ability to mitigate this type of attack always […]