Blog

    ddos mitigation techniques

    DDoS Protection Strategy | DDoS Protection and Risk

    DDoS Protection and Risk   CISO’s have the challenging task of protecting businesses from overall cyber threats to avoiding sudden, malicious, and... Read More

    Our Top 8 Twitter Cybersecurity Influencers - 2020

    Our Top 8 Twitter Cybersecurity Influencers - 2020 Cybersecurity developments are alarming.  As the number of IoT and smart devices grows, so do the... Read More
    shutterstock_1406909927 (2)-1

    Has your DDoS Mitigation Evolved With The Evolving Threats?

    Businesses have evolved, and so have DDoS Threats. Has your DDoS Mitigation evolved?   There has been a significant increase (more than a double) the... Read More
    bigstock-Ddos-Cyber-Attack-Technology--287270233

    Reduce your DDoS risk to 2% and under

      Reduce your DDoS risk to 2% and under   Enterprises deploy DDoS Mitigation to build their defences against DDoS Attacks. Even then, according to... Read More
    Digital Transformation (Resized)

    The Online Integrity of your Digital Transformation

    Nothing will ever be as it was. Read More
    Cyber Vulnerabilities

    Diamonds are Forever. So are DDoS Vulnerabilities.

    Diamonds are Forever. So are DDoS Vulnerabilities. Cyber security vulnerabilities usually refer to weaknesses in software code that allow threat actors to... Read More
    html5_bg_no_icons

    HTML5 PING Attack & Mitigation Breakdown

    The HTML5 PING Attack HTML 5 has introduced many positive changes to web page structure and functionality. One of these has allowed web developers to send... Read More
    State-of-DDoS-Protection-Dec-2018

    MazeBolt Publishes State of DDoS Protection Report

    Ramat Gan, Israel Read More
    Cyber Mask (Resized)

    Understanding the CoAP DDoS Attack Vector

    Understanding the CoAP DDoS Attack Vector   There are new DDoS attacks everyday and CoAP is the latest. Their damage potential changes dramatically, based... Read More