Cloud Security
Why You Should Invest in Cyber Security Staff

Why You Should Invest in Cyber Security

While the Internet is a great equalizer, allowing global expansion of businesses without the need to invest a lot of money, it has its risks, too. Companies of all sizes must concern themselves with cyber security to protect themselves. In fact, two thirds of companies claim cyber security is needed. If your business were to suffer an attack, the financial losses could be devastating.

Different Methods of Attack

Even if you can be certain that none of your employees will fall for a phishing scam, you’re n...

Read more
More posts on Cloud Security
Read more
2018’s Most Dangerous Cyber Threats

Attacks to your online security, change every year. 2018 will bring the biggest threats we’ve seen yet. Learn more about what you can do from CDNetworks.

Read more
The 5 Industries Most Vulnerable to Cyber-Attacks

Cyber-attacks continue to be a threat to businesses and government agencies across the globe. Learn which 5 industries are most vulnerable from the pros at CDNetworks.

Read more
Protect Yourself While Shopping

In 2017, 79% of U.S. consumers shopped on the web or their phones as opposed to in brick-and-mortar stores. With Cyber Monday alone bringing in more than $6.6 billion dollars this year, it appears that shopping online is the prevailing method for consumption. But, while the advent of apps and easy-to-use mobile sites have made it simple to complete your purchase, it’s also created new opportunities for theft and fraud.

Read more
FIGHT DDOS ZOMBIE BOTS WITH A CLOUD SECURITY INTELLIGENT ARMY

Despite attempts to block or take down command and control nodes and open proxies, DDoS attacks continue to evolve and are still expected to increase, according to many reports including CDNetworks’ recent security report

Under DDoS attack? Get help now
Read more
Overconfidence and underpreparedness in DDoS mitigation, and the dangers for European businesses

With DDoS attacks now making headlines regularly, the threat of being the next target is very much real for European businesses. The Mirai botnet of October 2016 is a perfect example. This prolific attack undermined the likes of Twitter, Amazon and the BBC, and highlights how cybercriminals are taking advantage of the increasing number of connected devices to carry out cyber-attacks en masse. The recent news of the Reaper botnet only adds more fuel to the fire, especially when it is rumoured to have the potential to cause more damage than its predecessor.

Read more
Improving web security with a CDN

There are a number of reasons why DDoS attacks are a popular way to target websites and take them offline. The main reason why they are so popular is that no hacking expertise is required, which makes them a simple form for cyber-attack. A botnet can be hired cheaply and used to direct a massive amount of traffic at a website, dramatically slowing it down, or making it inaccessible altogether.

Read more
Tips to Protect Your Business from DDoS Attacks

Whether you’re a Fortune 500 company or a neighborhood retailer, cybercrime is a genuine threat to your business. Learn how to protect your web property from DDoS attacks!

Read more
DDoS Attack Trends Q2'17

Every quarter, CDNetworks publishes findings on the attacks we've blocked against the CDNetworks CDN and security service customers. There are always risks of DDoS attacks on your business, so it is imperative to develop countermeasure against future attacks. Get on the defensive, prepare your response method to threats against your service.

Read more
3 WAYS TO SECURE ECOMMERCE DATA

With massively increased online shopping taking place this holiday season, it’s normal for your customers to wonder if they are shopping on a secure ecommerce site. There are several ways to provide peace of mind to those shoppers. First, ensure that your site is PCI compliant and reflect that in your privacy policy. 

Read more
A MULTI-DNS SOLUTION PROVIDES FAIL-OVER WHEN YOUR VENDOR IS ATTACKED

The DNS-based DDoS (distributed denial-of-service attack) has become one of the most common attacks on the internet, bringing down end-user websites. The purpose of DNS or Domain Name System, is to lookup a domain name on the internet and provide an IP address. This allows the user to connect to the correct website.

Read more
HEY YOU, GET OFF OF MY CLOUD

When it comes to a cloud DDoS attack, you can never be over prepared. You need to fight an army of cloud invaders with a defense infrastructure ready to absorb and offload attack traffic. Building that defense infrastructure yourself is not only cost prohibitive, it potentially will never be enough.

Read more
UNDERSTANDING THE XOR.DDOS ATTACK

In September 2015, a mass-scale XOR.DDoS attack over 150 Gbps occurred utilizing Linux Malware. XOR.DDoS is the name of the malware, not the attack name, used to affect the Linux system. It was detected in September 2014 and the analysis of the malware was published by various security service companies and blogs.

Read more
GARTNER SECURITY SUMMIT: RELIANCE ON 3RD PARTY SECURITY MARKET IS INCREASING

During the Summit this week in Maryland, a Gartner analyst predicted that the security market would reach $92B in 2016. According to Gartner, as security becomes more complicated, organizations are looking outside their own skill set to vendor solutions. 

Read more
UNAUTHORIZED ACCESS IS THE BIGGEST THREAT TO CLOUD SECURITY

A new Cloud Security Spotlight Report found that 53% of organizations surveyed see unauthorized access through misuse of employee credentials and improper access controls as the single biggest threat to cloud security. And, 96% of organizations surveyed have some or all of their applications in the cloud. 

Read more
GRANULAR APPLICATION SECURITY WITHOUT REPLACING YOUR VPN

VPN is considered the defacto way of securing the IT perimeter, but most organizations are looking for more granular solutions. Can a company secure individual applications while keeping the VPN they have worked so hard to implement?

Read more
A BETTER WAY TO SECURELY SHARE ENTERPRISE APPS WITHOUT LOSING PERFORMANCE

Join CDNetworks and 451 Research for our next live webcast on April 13th at 8:00 am Pacific Time.

Read more
PERIMETER SECURITY IS NOT ENOUGH FOR APPLICATION SECURITY

We attended a 451 Research breakfast during RSA last week where cyber security was discussed by several 451 analysts.

Read more
CONTENT DELIVERY NETWORK AND WEBSITE PERFORMANCE STATS 2016

Companies leverage Content Delivery Networks to increase their online presence in the global market and deliver a high-quality user experience worldwide.

Read more
10 STATISTICS THAT DEMONSTRATE THE NEED FOR DDOS MITIGATION

In today’s connected world, 100 percent uptime and exceptional site performance is not a nice-to-have, it’s a necessity. It’s one of the most precious commodities a website can provide its users; that’s why it’s also one of the most targeted.

Read more
5 Memorable Online Gaming Website Crashes

Over the last decade, the online gaming industry has grown three-fold from $13.8 billion to $41.4 billion in 2015 and become an exceptionally profitable market.

5 security challenges of moving to the cloud
Read more
Image source © chaiyapruek / Fotolia
The security challenges of moving to the cloud

In the past, it may have been acceptable to have a trade-off between security and availability, but today, that is no more - business need secure data and applications, available anywhere, from any device.

Read more
5 Key Cloud Security Challenges

Today’s businesses want it all: secure data and applications accessible anywhere from any device. It’s possible with cloud technology, but there are inherent challenges to making it a reality.

Read more
Cloud Security: Public Vs. Private Cloud

It’s pretty remarkable how much the use and advancement of the cloud has changed the way enterprises – and their employees – operate.

Read more
What Is Cloud Security and What Are the Benefits?

When businesses are looking to move all or part of their operations to the cloud, there is the inevitable question of security.

Read more
DDoS attacks – The ease of bringing down your business

The explosion of the World Wide Web for modern day business has been quick and indisputable, connecting small local businesses into a global market of commerce.

Read more
Moving Beyond Hardware-Based WAN Optimization with Today’s ADNs

The workplace isn’t quite as defined at it once was. It does not exist within four walls, or even between 9 a.m. and 5 p.m. In today’s global economy, the workplace is rapidly changing and its network needs are no longer simple solutions.

Read more
China Firewall VPN Updates: What Your Business Needs to Know

China’s Golden Shield project, commonly known as the “Great Firewall,” was in the news recently. The Chinese government has launched a “smarter and stricter Internet filter,” says Nasdaq, making it “more difficult to use services called virtual private networks (VPNs) to circumvent the country’s blocks to U.S. services like Google and Facebook.”

Read more
Image source CDNetworks
TWO BIG CHANGES AHEAD IN CLOUD STORAGE: HYBRID AND DATA SOVEREIGNTY

Guest Blogger – Ajay Patel, Co-founder and CEO, HighQ Cloud storage has undergone several changes and adaptations throughout its short history, particularly with regards to pricing, scale and accessibility. Today, there are cloud storage options to meet the needs of most users, from individual consumers to the most security conscious enterprises. I predict that cloud storage […]

Read more
Image source CDNetworks
Mitigating DDoS attacks

Distributed Denial of Service (DDoS) attacks have been on the rise in recent years and show no sign of slowing up. 

Understanding XOR.DDoS attacks
Read more
Image source CDNetworks
Understanding XOR.DDoS Attacks

In September 2015, a mass-scale XOR.DDoS attack over 150 Gbps occurred utilizing Linux Malware.