173 results
cables illuminated
/ Heather Broughton

Where Great Minds Meet: SCTE TechExpo

If you’ve got Georgia on your mind, there’s probably a good reason. SCTE TechExpo is coming to Atlanta September 24-26, and NETSCOUT will be there too. For the past 40+ years, SCTE...

  • DDoS
  • Service Provider
Hand holding tablet with buildings sitting on laptop IOT images floating over them.
/ Andrew Green

Navigating Security Challenges in the Era of 5G Fixed Wireless Access

The telecom sector is experiencing a transformative period, with fixed wireless access (FWA) emerging as a significant growth area amid various challenges. As telecom operators...

  • DDoS
  • Service Provider
Hand on laptop
/ Brad Christian

How Long Does a DDoS Attack Last?

Before diving into how long a distributed denial-of-service (DDoS) attack lasts, it’s necessary to uncover how a DDoS attack works. DDoS attacks aim to overwhelm systems by sending...

  • DDoS
  • Service Provider
Image of what is believed to be a DDoS Attacker
/ Brad Christian

Why Do Hackers Use DDoS Attacks?

Distributed denial-of-service (DDoS) attacks are a common tactic among hackers. They disrupt the availability of networks, applications, websites, and more to interrupt the...

  • DDoS
  • Service Provider
Female Athlete wearing gold medal around her holding blue, white and red vertical striped flag above her head.
/ Andrew Green

Ensuring Gold Medal Connections at the Summer Games

The 2024 Summer Games is among the largest events in the world, with everyone from home viewers to businesses, industries, and entire nations having interest and involvement. Each...

  • DDoS
Art for Enterprise VPN DDoS Attacks
/ Brad Christian

How to Protect Your Enterprise VPN from DDoS Attacks

Distributed denial-of-service (DDoS) attacks are a major risk for enterprise virtual private network (VPN) concentrators. Protecting these servers is paramount for business...

  • DDoS
Hands on Keyboard
/ Andrew Green, Scott Iekel-Johnson

Why NetFlow Is Still the Best Mechanism for Detecting DDoS Attacks

Recently some network operators have raised questions about the use of flow data to detect distributed denial-of-service (DDoS) attacks, with the main concern being a perception...

  • DDoS
  • Service Provider
Man sitting at row of monitors in a NOC.
/ Michael Wetherbee

Are Attacks Hiding in Your Encrypted Traffic?

Distributed denial-of-service (DDoS) attackers are both persistent and creative. One of their creative methods that has seen an increase recently is attacks on HTTPS web...

  • DDoS
  • Security
  • Service Provider