Symantec Asia Pacific 2015 Security Predictions

Security analysts called 2013 the year of the mega breach, and severe vulnerabilities such as Heartbleed and Shellshock in 2014 showed that the security community can never rest on its laurels. All indications...
0 comment

2014 Data Breach Investigations Report

Gain fresh insight into cyber espionage and denial-of-service attacks in the 2014 Data Breach Investigations Report (DBIR). Please complete the form below to download this research: E-mail Address ...
0 comment

Security Testing and Assessment Services Guide

This document provides you with an understanding of common cyber security tests and assessments organizations can use to evaluate their security posture and the distinctions between them. It will help...
0 comment

10 Tips to Minimize the Impact of a Security Breach

The Dell SecureWorks Counter Threat Unit research team has developed a set of 10 recommended best practices to help minimize the duration and impact of a security breach. This white paper also includes...
0 comment

Ovum Research: Tackling the DDoS Threat to Banking in 2014–DDoS Gets Bigger, Smarter, and More Blended

Sponsored by Akamai DDoS attacks have undergone significant evolution. On the one hand, they have grown larger. But attackers are also harnessing more sophisticated technologies, such as headless browsers,...
0 comment

Data Breach and DDoS: Security in a Faster Forward World

Sponsored by Akamai In addition to brute force/scale based attacks, attackers often probe for and then take advantage of application vulnerabilities to steal data or pursue financial gain. This means...
0 comment

Secure Your Data: Visibility for Your Business User

Join this webinar with experts from Aberdeen and IBM to learn why leading organizations are moving away from the chaos of multiple methods to a single managed file transfer platform, and get best practices...
0 comment

DDoS Attack Threats | Q2 2014 Global DDoS Attack Report Infographic-Botnets | Akamai Infographic

This easy-to–read DDoS trends infographic explains in graphics and images trends in distributed denial of service attacks in Q2 of 2014.  Summarizing botnet exploitation of web vulnerabilities and...
0 comment

DDoS Attack Threats | SNMP Reflection Threat Advisory | Akamai Presentation

Many older SNMP devices have the ability to take public queries from the Internet enabled by default, allowing malicious actors to launch reflected DDoS attacks by directing SNMP messages at a chosen...
0 comment

DDoS Attack Threats | Storm Network Stress Tester | Akamai Podcast

The Storm Network Stress Tester DDoS crimeware toolkit targets Windows XP (or higher) operating systems, infecting computers with malicious software that turns them into attacker-controlled, obedient...
0 comment