171 results
2 hands on lite up laptop keyboards
/ Chris Lucas

Those Sneaky Adaptive DDoS Attacks!

Merriam-Webster’s dictionary defines “sneaky” as “marked by stealth, furtiveness, or shiftiness.” “Stealth” is defined as “intended not to attract attention.” “Furtive” is defined...

  • DDoS
3 separate images together with Skydiver jumping out airplane, car wheel exposes red brake pad, orange and white blurred image
/ Chris Lucas

Parachutes, Brakes, and Adaptive DDoS Defenses Must Work Well When Needed

When do you settle for less than 100 percent reliability when it comes to products or solutions? Answer: When the risk of the failure is not fatal, catastrophic, or extremely...

  • DDoS
Green background with blue and pink spheres in right bottom corner of slide
/ Chris Lucas

The Old Ways Are Not Good Enough Against Modern DDoS Attacks

The medieval castle became the fortification of choice in the Middle Ages, and attack strategies evolved into scaling ladders, battering rams, siege towers, catapults, and mining...

  • DDoS
Quarter picture of blue & green circle in left lower corner, screen color split with green upper half & black lower with green circle and 4 spherical rings around it.
/ NETSCOUT

Let’s face it: Life isn’t safe, and threats exist all around us.

Most of us learn early on not to stroll down a dark alley, but if you’re an internet service provider (ISP) or enterprise, mitigating threats isn’t that simple. The devastation...

  • DDoS
Background of hospital with beakers, test tubes, needles, heart, suitcase in foreground
/ Michael Wetherbee

DDoS Attacks on the U.S. Healthcare System Could Have Disastrous Results

Imagine you need something to keep you alive, but you find out that a hacker has shut down the system that provides that life-saving necessity—say a ventilator or a medication...

  • DDoS
Red Triangle with red exclamation mark in center of image
/ Chris Lucas

Fact Versus Fiction in Modern DDoS Attacks and Defense Strategies

Did 300 ancient Spartan warriors hold off tens of thousands of Persians at Thermopylae? Probably not. Did George Washington chop down his father’s cherry tree and then confess...

  • DDoS
Picture of Keyhole and binary code as background
/ NETSCOUT

How to Prepare for and Mitigate DDoS Attacks

Organizations in any sector, in any vertical market, and in any part of the world depend on the Internet in order to function. They must be able to operate at the speeds and scale...

  • DDoS
Smoke illustrated on black to grey background with quarter, half green and pink circles on left side
/ Gary Sockrider

Introducing the 5th Anniversary DDoS Threat Intelligence Report

The rising tide of distributed denial-of-service (DDoS) attacks threatens organizations worldwide that deliver critical access and services. From our first Worldwide Infrastructure...

  • DDoS
Red Galaxy
/ Michael Wetherbee

Actionable Threat Intelligence Is Required to Automatically Stop Zero-Day DDoS Attacks

A Zero-Day distributed denial-of-service (DDoS) attack is an attack that does not have a known solution. It is referred to as a “Zero-Day” threat because once the defect is...

  • DDoS