Just recently I wrote an article for Venture Beat where I retold the story of the chess playing king and the traveling sage. The sage, in return for beating the king at chess, requests that [...]
Taking a look back to the very first Worldwide Infrastructure Security Report (WISR) twelve years ago and of course, many things are vastly different. One thing is clear. Things are more complex today, from the attacks to the infrastructure, and that benefits attackers.
As we look back over 2016, one of the most obvious stories will be the dramatic rise in the weaponization and size of DDoS attacks. At the beginning of 2016 we noted the largest attack being approximately 500Gbps. In the later months of 2016, we saw the monetization of multiple IoT-based botnet DDoS attacks that were close to breaking the 1 Tbps mark.
As my colleague discussed back in September, one of the widest ranging threats to an educational institution’s Information infrastructure today are Distributed Denial of Service (DDoS) attacks - specifically, DDoS as a smoke screen as [...]
Machine learning is programmatic at heart. It typically starts with a large amount of data that's been organized by people. This might be tagged photos, for example. The program analyzes the data closely and sniffs [...]
Throughout this month, we have shared our thoughts on the various themes aligned with National Cybersecurity Awareness Month. This week’s theme is “Our Continuously Connected Lives: What’s Your ‘App’-titude?” In an effort to help generate more consumer awareness around online security preparedness, Arbor commissioned a survey […]
There is a wealth of information that can be gathered from every mobile device and every subscriber session device both successful and failed. What is the worst performing mobile device? How many and which mobile [...]
The recently announced acquisition of Time Warner by AT&T speaks to both the fear of service providers becoming relegated to “dumb pipe” or more simply just communication transport providers and to the importance of content [...]