British hacker jailed for launching DDoS attack…

According to Akamai, Mirai botnets are being used increasingly and strategically by hackers. Are you prepared for the next DOS attack? #technology #cybersecurity #DOSAttacks #DDOS #Botnets #Mirai British hacker jailed for launching DDoS attack… According to Akamai, Mirai botnets are being used increasingly and strategically by hackers. Akamai Dynamic Signal Read More

British hacker jailed for launching DDoS attack…

According to Akamai, Mirai botnets are being used increasingly and strategically by hackers. Are you prepared for the next DOS attack? #technology #cybersecurity #DOSAttacks #DDOS #Botnets #Mirai British hacker jailed for launching DDoS attack… According to Akamai, Mirai botnets are being used increasingly and strategically by hackers. Akamai Dynamic Signal Read More

British hacker jailed for launching DDoS attack…

According to Akamai, Mirai botnets are being used increasingly and strategically by hackers. Are you prepared for the next DOS attack? #technology #cybersecurity #DOSAttacks #DDOS #Botnets #Mirai British hacker jailed for launching DDoS attack… According to Akamai, Mirai botnets are being used increasingly and strategically by hackers. Akamai Dynamic Signal Read More

British hacker jailed for launching DDoS attack…

According to Akamai, Mirai botnets are being used increasingly and strategically by hackers. Are you prepared for the next DOS attack? #technology #cybersecurity #DOSAttacks #DDOS #Botnets #Mirai British hacker jailed for launching DDoS attack… According to Akamai, Mirai botnets are being used increasingly and strategically by hackers. Akamai Dynamic Signal Read More

Security Collaboration – How do you Start?

We see weekly post, pontifications, announces, and proclamations about the need for greater security collaboration. Many times, the organizations and groups who are posting these “aspirations” fail to take the collaboration to the next step. They are not sure how to break into productive security collaboration. In the security community, “productive security collaboration” is built Read More

5G Latency – Reality Checks

The industry is flooded with a lot of “5G will save the planet” without doing the homework to understand what is going on. It is shocking to see disinformation statements that “5G is expected to slash data transmission delays from about 30 milliseconds to less than one.” Yes! 5G defines the law of physics! 5G Read More

What can Enterprises do to protect against BGP Hijacks?

Yes, you can minimize the risk to BGP Hijacks. All enterprises around the world need to have a conversation around BGP Hijacks. We see security news around malware, phishing ransomware, DOS attacks, breaches, and range of other attacks. What we do not see is conversations around BGP Hijacks. A BGP Hijack can happen on one Read More

7 Critical Security Conversations

The wave of supply chain security conversations that was sparked by the Bloomberg articles has people talking (see The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies and related articles). The increased interest in supply chain security is important. It is feasible for threat-actors sneak in a backdoor, exploitable code, or Read More

Master Class in Internet Networking …. Free

Nick Feamster Provides Operators, Engineers, and Students with the Tools to Understand How the Internet is Glued Together Who is Nick Feamster? Dr. Nick Feamster is known in the Internet Operations community as one of our primary source of great talent, research that pushes the Industry forward, a deep-dive investigation into security issues on the Read More

Hardware & Software Vulnerabilities are Guaranteed

The long years of experience have taught me through experience, hardware & software vulnerabilities are guaranteed. It is not a matter of “if” but when. The sad reality is that most hardware and software vendors are not ready for vulnerabilities when they happen. Their response ranges from “I’m going to take legal suit” against the Read More