

This report contains the observations and insights derived from mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services and the security research of Verisign iDefense Security Intelligence Services.
It represents a unique view into the attack trends unfolding online...
Published: Jun 20, 2014


At the heart of every organization are its employees, the engine that drives growth, fueled by the data they create and store on their laptops, tablets, and mobile phones, as well as access through data center and cloud servers.
Establishing endpoint resilience minimizes the impact of a cyberattack and restores...
Published: Sep 04, 2019


Organizations are becoming increasingly aware of the threat that Distributed Denial of Service (DDoS) attacks can pose to the availability of any on-line services which they offer. Now, if an organization offers on-line services to customers, employees or business partners then they are open to attack. And, unfortunately...
Published: Oct 07, 2013


Cyber criminals do not just develop one attack and then abandon it after one use. Rather, they seek to make their software usable for as long as possible. Evasion techniques allow known threats to circumvent detection by security products.
Research indicates that cyber criminals perform their own testing and make...
Published: Nov 15, 2013


AlienVault's USM is tailor-made for the needs of the security-savvy SMB. This analyst report reviews AlienVault's SMB-focused approach to SIEM and discusses the competitive landscape.
Published: Jul 16, 2014


Organizations face a new breed of cyber attacks that easily thwart traditional defenses. Today’s threat landscape demands a fundamentally new approach, one that does not rely on binary signatures, lists, or rules to detect threats.
Aware that yesterday’s defenses are no match for today’s attacks,...
Published: Feb 28, 2014


Advancements in medicine, the increase in regulations to protect patient and doctor, and the digitization of the entire process requires a scalable, secure, uninterrupted and bandwidth-flexible healthcare IT network.
Read this ebook to see how SD-WAN can change your healthcare IT network.
Published: Aug 06, 2020


In 2014, sophisticated attacks yielded big rewards for cybercriminals. In 2015 we expect to see cyber criminals, fueled by the success of high profile hacks, continue to innovate with an even greater focus on deceiving and evading existing security solutions. As attacks continue to become more advanced, so must the security...
Published: Jun 30, 2014


The risks to organizations are more dangerous than ever as attackers focus their efforts on the endpoint. In the past couple years we have seen well known businesses suffer huge losses of intellectual property and goodwill because of attacks that began at the endpoint. As these risks continue to rise, regulators are responding...
Published: May 09, 2013


The three challenges you’re likely facing – cost and complexity, defenses that can’t keep up, and overburdened staff – drive ten real and tangible problems that require lots of time and resources. Endpoint security is a challenge. Defenses aren’t keeping up, and security staff is stretched...
Published: Jan 11, 2019


Distributed denial-of-service (DDoS) attack types have moved up the OSI network model over time, climbing from network attacks in the 1990s to session attacks and application layer attacks today. Network attacks include DDoS variants such as SYN floods, connection floods, or ICMP fragmentation.
Published: Oct 31, 2013


In the new era of cyber warfare, states, cities, and towns are directly in the cross hairs. A new breed of cyber attacks is targeting critical infrastructure, key services, and personal data on public employees and citizens.
As a result, cyber security has never been so critical for state and local governments. But...
Published: Mar 05, 2014


Ponemon Institute’s 2014 Cost of Cyber Crime study finds cyber attacks cost the average U.S. company $12.7 million with some surveyed companies experiencing losses up to $61 million. That’s up more than 9 percent over last year. Businesses in other countries are close behind.
Download these...
Published: Dec 10, 2013


In this report, Kaspersky Lab’s cybersecurity experts give you an insight into:
• How businesses can suffer from direct – and indirect – cyber-espionage attacks
• What you can do to protect your business… and its hard-won reputation
• How specific technologies can...
Published: Feb 20, 2014