You searched for DDoS/ | SC Media

Your search for DDoS/ returned 66 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Feature remove
Security News remove

Your search for DDoS/ returned 66 results

Sort Results:

Relevant Recent
Advocates, Security News, Women in Security

Women in Security – Advocates

Women in the cybersecurity industry couldn’t thrive without advocates like the five women honored here. Nada Marie Anid vice president for strategic communications and external affairs, New York Institute of Technology The first female dean of the New York Institute of Technology (NYIT) School of Engineering and Computing Sciences, Nada Marie Anid has been a…
Reboot Awards 2017

Threat Seeker – Darren Anstee

Category: Threat Seeker Name: Darren Anstee Title: Chief Technology Officer Company: Arbor Networks Why nominated: Anstee’s creation of ATLAS, a threat monitoring infrastructure that collects data from 400 network operators that handle about one-third of all internet traffic with a focus on tracking DDoS attacks. Profile: Darren Anstee joined Arbor Networks 14 years ago where he…
IoT

Mirai variant caused German telecom disruption; 5M routers reportedly susceptible if left unpatched

Service disruptions affecting nearly one million Deutsche Telekom landline customers since last weekend are the result of a worldwide cyberattack aimed at infecting routers with a variant of Mirai Internet of Things (IoT) botnet malware, German authorities and security researchers have now confirmed. The attack seeks to exploit a vulnerability in open remote-management ports found…
Internet of Things
Features

Can one CISO ever beat an army of IoT devices?

The security threat from the Internet of Things (IoT) has grown real because far too many of those sneaky IoT devices fly in under the radar. Corporate maintenance, facilities and operations departments are not accustomed to requesting IT's signoff on purchasing light bulbs or door locks. And yet, when those devices have their own independent - or dependent - communications capabilities, they are an easy backdoor for cyberthieves.
Features

Waiting for DDoS

In football, many offensive plays are designed to trick the defense into thinking something else is about to unfold.
Features

Top to bottom assurance

When chief executives flout security rules, the losses can be higher than usual. What should organizations do to help their leaders stay on track with cybersecurity? Karen Epper Hoffman reports.
Features

Book of Lists

Every December, we take a look back to gather up some of the year's biggest trends and some of the whackiest happenings in the cybersecurity space.
Next post in Features