Blog

    shutterstock_374801338

    Dynamic Feedback Redefines DDoS Mitigation

    No Cyber Security Measure is Perfect In the cyber security cat and mouse game, between Cyber security professionals, on the one hand, and Cyber threat... Read More
    shutterstock_1406909927 (2)-1

    Businesses have evolved, so have DDoS Threats. Has your DDoS Mitigation evolved?

    There has been a significant increase (more than a double) the number of attacks of 5Gbps or under. These smaller and more carefully targeted attacks can... Read More
    bigstock-Ddos-Cyber-Attack-Technology--287270233

    Reduce your DDoS risk to 2% and under

    Enterprises deploy DDoS Mitigation to build their defences against DDoS Attacks. Even then, according to Neustar, when comparing Q1 2019 vs. Q1 2018,... Read More
    Digital Transformation (Resized)

    The Online Integrity of your Digital Transformation

    Nothing will ever be as it was. Read More
    Cyber Vulnerabilities

    Diamonds are Forever. So are DDoS Vulnerabilities.

    Cyber security vulnerabilities usually refer to weaknesses in software code that allow threat actors to take advantage of vulnerable programs, web... Read More
    Screenshot (39)

    Naming Changes to Traditional DDoS Testing Reporting KPI’s

    After internal considerations, consultations with our customers and the emergence of DDoS Radar product line, after 5 years we have taken the decision to... Read More
    Screenshot (35)

    Lessons Learned from a Day of DDoS Testing

    To get a “view from the other side” of how our customers experience MazeBolt’s BaseLine DDoS Testing, I decided to join a customer onsite during testing. Read More
    MazeBolt_Phishing_Simulator_Blog_Image_3_Resized

    Les 4 commandements du phishing — N° 1 : De tous les e-mails tu te méfieras.

    Ce message est le premier d’une série de 4 qui mettra en lumière les principaux aspects du phishing (ou hameçonnage). L’objectif est de mettre en évidence... Read More
    180628 Nocember Threat

    INFOGRAPHIC: Your Q4 Nocember DDoS Risk in 3 Points

      Read More