Blog

    3 Major Limitations of ISP DDoS Protection

    3 Major Limitations of ISP DDoS Protection Earlier this year, Andorra Telecom suffered a DDoS attack during a Minecraft tournament, taking not only some... Read More

    4 Common Misconceptions in DDoS Mitigation

      4 Common Misconceptions in DDoS Mitigation After several years in cybersecurity and specifically in the DDoS mitigation space, I often come across... Read More

    DDoS Mitigation Solutions | Calculate Cost of DDoS Attacks

    Calculate Costs of DDoS Attacks   In the first part of the blog series, we discussed the direct costs of DDoS attacks.  In this second part, we will... Read More

    DDoS Mitigation Policies | DDoS Attacks Surging | DDoS Commoditization

    DDoS Attacks Surging in 2020 Neustar, a global information and technology provider company, revealed that it found a 168% increase in distributed... Read More

    Dynamic Feedback Redefines DDoS Mitigation

    No Cyber Security Measure is Perfect In the cyber security cat and mouse game, between Cyber security professionals, on the one hand, and Cyber threat... Read More

    Has your DDoS Mitigation Evolved With The Evolving Threats?

    Businesses have evolved, and so have DDoS Threats. Has your DDoS Mitigation evolved?   There has been a significant increase (more than a double) the... Read More

    Reduce your DDoS risk to 2% and under

      Reduce your DDoS risk to 2% and under   Enterprises deploy DDoS Mitigation to build their defences against DDoS Attacks. Even then, according to... Read More

    Diamonds are Forever. So are DDoS Vulnerabilities.

    Diamonds are Forever. So are DDoS Vulnerabilities. Cyber security vulnerabilities usually refer to weaknesses in software code that allow threat actors to... Read More

    Naming Changes to Traditional DDoS Testing Reporting KPI’s

      DDoS Testing Reporting KPI’s After internal considerations, consultations with our customers and the emergence of DDoS Radar product line, after 5 years... Read More