Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 26 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

DDoS awareness day aims to address the threat issues

by The Gurus
November 22, 2013
in Editor's News
Share on FacebookShare on Twitter

Today is the first awareness day for distributed denial-of-service (DDoS) attacks, aimed at raising awareness of the brutality of the vector and potential mitigation strategies.

Hosted by a number of companies including Neustar and Arbor Networks, the all-day online event will bring together industry and government experts to raise awareness around the growing threat. In the same week as Google announced the launch of Project Shield, Neustar head of security services Susan Warner, told IT Security Guru that it was intending to raise awareness “as a lot of IT managers do not truly understand the importance of the situation”.
Warner said: “People will hear about DDoS attacks and not do anything [to protect themselves], so we wanted to do something within the US Cyber Security Awareness month, from DDoS 101 to technical challenges and what people need to know about.
“After Spamhaus, it definitely is evolving; with application layer attacks to more sophisticated attacks, there are now videos on YouTube on how to launch a DDoS attack and we see an increase in attacks on networks, so this is a thriving threat.”
Speaking at last week’s IP Expo conference in London, Werner Thelmeier from Radware said that DDoS is the highest cyber security threat as there are more attack vectors which can be blended, while low and slow and HTTPS attacks are also prevalent.
He said: “The firewall and intrusion prevention systems cannot protect you from a DDoS as three entities are under attack – the server, firewall and pipe. You need to stop the attack before it reaches your infrastructure.”
Also speaking at the conference on DDoS attacks, F5’s Keiron Shepherd said as botnets become harder and harder to build, this is an easier method of flood attack. Looking to future tactics, Shepherd said that a lot will target HTML5 and Java plug-ins, while mobiles will be targets too. In terms of protection, he said: “I think that the hybrid approach will evolve and keep evolving. You have got to see attacks coming in, so unless you do SSL externally and can view it, there is no chance of mitigating it.”
Warner commented that there is too much reliance put on the firewall for protection, and today’s program of live eventswill offer different content for everyone. “After the event we will open up the communication lines with attendees on what can benefit you, and we want to make this a collaborative effort for additional security areas,” she said.
“Whether you’re a massive corporation or a small business, the threat of a DDoS attack remains very real and can have massive financial and structural ramifications,” said Rodney Joffe, senior vice president and fellow at Neustar.
FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Adopting a security policy around data is more efficient than the perimeter

Next Post

ICO fines MoJ after three breaches of prisoner details

Recent News

Synopsys discover new vulnerability in Pluck Content Management System

Synopsys discover new vulnerability in Pluck Content Management System

March 24, 2023
Dole Food Company

Dole confirms employee data was breached following February ransomware attack

March 24, 2023
call centre

MyCena Improves Customer Data Access Protection in Call Centers and BPOs

March 23, 2023
Blue logo, capitalised letters. SPECOPS.

Fortune 500 Company Names Found in Compromised Password Data

March 23, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information