A Risk-based Approach to DDoS Protection

    CISO’s have the challenging task of protecting businesses from overall cyber threats to avoiding sudden, malicious, and sophisticated DDoS attacks. DDoS...
    Read More

    Our Top 8 Twitter Cybersecurity Influencers - 2020

    Cybersecurity developments are alarming.  As the number of IoT and smart devices grows, so do the opportunities for hackers to plan and launch...
    Read More

    Businesses have evolved, so have DDoS Threats. Has your DDoS Mitigation evolved?

    There has been a significant increase (more than a double) the number of attacks of 5Gbps or under. These smaller and more carefully targeted attacks can...
    Read More

    Reduce your DDoS risk to 2% and under

    Enterprises deploy DDoS Mitigation to build their defences against DDoS Attacks. Even then, according to Neustar, when comparing Q1 2019 vs. Q1 2018,...
    Read More

    The Online Integrity of your Digital Transformation

    Nothing will ever be as it was.
    Read More

    Diamonds are Forever. So are DDoS Vulnerabilities.

    Cyber security vulnerabilities usually refer to weaknesses in software code that allow threat actors to take advantage of vulnerable programs, web...
    Read More

    HTML5 PING Attack & Mitigation Breakdown

    The HTML5 PING Attack HTML 5 has introduced many positive changes to web page structure and functionality. One of these has allowed web developers to send...
    Read More

    MazeBolt Publishes State of DDoS Protection Report

    Ramat Gan, Israel
    Read More

    Understanding the CoAP DDoS Attack Vector

    There are new DDoS attacks everyday and CoAP is the latest. Their damage potential changes dramatically, based on many factors. It might be surprising to...
    Read More

    Mapping DDoS Attacks to Mitigation Mechanisms

    Management will always drive to minimize downtime and trust you to ensure that the DDoS mitigation solutions you have invested in can ensure that. With...
    Read More