1-800-309-4804         Contact Us         MyNETSCOUT         Blog         Investors         Company

Security

­

SECURITY

  • Mark Twain

History Doesn’t Repeat Itself but it Often Rhymes

By |February 1st, 2017|

Taking a look back to the very first Worldwide Infrastructure Security Report (WISR) twelve years ago and of course, many things are vastly different. One thing is clear. Things are more complex today, from the attacks to the infrastructure, and that benefits attackers.

  • Arbor Chart

A DDoS Attack Only Needs to Be as Large as “Your” Network Pipe

By |January 25th, 2017|

As we look back over 2016, one of the most obvious stories will be the dramatic rise in the weaponization and size of DDoS attacks. At the beginning of 2016 we noted the largest attack being approximately 500Gbps. In the later months of 2016, we saw the monetization of multiple IoT-based botnet DDoS attacks that were close to breaking the 1 Tbps mark.

  • Higher Education

Higher Education’s Lessons on Cybersecurity

By |January 4th, 2017|

As my colleague discussed back in September, one of the widest ranging threats to an educational institution’s Information infrastructure today are Distributed Denial of Service (DDoS) attacks – specifically, DDoS as a smoke screen as a diversion tactic for the invasion and exfiltration of business data.

In a recent article published in […]

  • Cybersecurity Survey

Survey Says: Consumer Anxiety About Online Security Does Not Translate into Action

By |October 26th, 2016|

Throughout this month, we have shared our thoughts on the various themes aligned with National Cybersecurity Awareness Month. This week’s theme is “Our Continuously Connected Lives: What’s Your ‘App’-titude?” In an effort to help generate more consumer awareness around online security preparedness, Arbor commissioned a survey […]

  • Free apps

Free Apps Come At A Cost

By |October 17th, 2016|

October is National Cyber Security Awareness Month which we use as an opportunity for an annual campaign to raise awareness about cybersecurity. In week three of the month-long awareness campaign, we focus on the topic of “from the break room to the board room: creating a culture of awareness in the workplace.”

As a society, […]

  • Cybersecurity

Tech Savvy Versus CyberSecurity Savvy

By |October 12th, 2016|

October is National CyberSecurity Awareness Month which is an annual campaign to raise awareness about cybersecurity. We live in a world that is more connected than ever before.  Look at the number of devices that we have connected to the Internet in our offices and homes.  During the month of October, there will be a lot […]

  • Online Security Protection Internet Safety

National CyberSecurity Awareness Month

By |October 4th, 2016|

October is National CyberSecurity Awareness Month and according to the U.S. Department of Homeland Security,

“National CyberSecurity Awareness Month is designed to engage and educate public and private sector partners through events and initiatives to raise awareness about cybersecurity, provide them with tools and resources needed to stay safe online, and increase the resiliency of the […]

  • Chasm

Network Traffic Analysis for Security: A “Market” on the Cusp of the Chasm?

By |October 4th, 2016|

At Arbor, and at our parent company NETSCOUT, we talk a lot about the value that comes from Network Traffic. Traffic can bring end-to end visibility of all users, applications and services, their activities and locations from a single perspective, allowing security teams to understand trouble spots and threats, and make smart and accurate decisions […]

  • Back to School

DDoS Attacks Are Coming Back to School

By |September 21st, 2016|

It is that time of year, where kids of all ages are heading back to school, with fresh, unwrapped school supplies in their backpacks with their smartphones, tablets, and laptops. Teacher and school administrators are busy preparing for their new incoming class of students, entering in student data, setting up distribution lists, updating their syllabuses, […]

  • blog microphone

On Blank Stares, Reflecting Ears, and DDoS Attacks . . .

By |September 19th, 2016|

A Guest Post by Dr. Edward G. Amoroso, CEO of TAG Cyber LLC

Whenever I get those dreaded blank stares from an audience having trouble understanding my clumsy description of the spoofing, reflection, and amplification inherent in distributed denial of service (DDoS) attacks, my lifeline is to jump to an analogy. Here is one […]