DDoS attacks are only becoming more destructive, and companies know it: That’s why one-half (49 percent) of the 200+ respondents in the 2018 IDG DDoS Report anticipate their organizations’ DDoS defense budgets to increase. But why are so many companies willing to invest precious resources on DDoS defense? Let me explain. Just How Much Are […]
Secure Application Delivery for Hyper-Converged Infrastructures
Today, every organization is undergoing digital transformation. Digital transformation will enable organizations of all sizes compete by using the right technology to drive innovation and time-to-market. Key to this is using the right hardware and software to simplify enterprise IT infrastructure, reduce cost and deploy innovative solutions that drive growth. Organizations have a lot of […]
Next Generation Firewalls May Not Stop Malware
Best Defense Against Malicious Encrypted Traffic Bad actors and malicious insiders are concealing threats in encrypted traffic in an attempt to steal sensitive data. In fact, it is predicted that as much as 70% of cyberattacks will use encryption as part of their delivery mechanism by 2019. Meanwhile, the use of encryption is growing rapidly. […]
How to Choose a Cloud Load Balancer
Load balancing of application traffic has been around for a long time. But, as more organizations move to the private and public cloud, it’s undergoing significant changes. Let’s look at some of the important considerations of this evolving technology. Three major requirements underlie IT operations and DevOps today: agile, efficiency and, multi-cloud operations. – Agile: […]
Three Misconceptions of Breaking and Inspecting SSL Traffic [Video]
There are a lot of misconceptions about breaking and inspecting SSL traffic. So much so that some companies elect to go without the ability altogether. In this video, A10 Senior Federal Lead SE James Schweitzer separates fact from fiction when it comes breaking and inspecting encrypted traffic and highlights the benefits of a dedicated decryption […]
What Are You Doing to Inspect Encrypted Traffic? [Video]
Adversaries are using sophisticated tactics to bypass security defenses and infiltrate networks. Along with employing HTTPS, they’ve begun using SSH and other advanced protocols for data exfiltration. SSH, for example, is often used for remote management access because it performs well. Adversaries now use remote desktop protocol (RDP) and data exfiltration over SSH. And when […]
Security for Intent-Based Networking
Networks have become more massive and complex than ever before. This year at Cisco Live US, people were talking about managing and defending networks at scale. Chuck Robbins, CEO of Cisco, said that 2.1 billion machine-to-machine connections have been added to the internet in the past year, and 27 billion more connections are expected to […]
What, Me Worry? Lackadaisical Employee Attitudes Resulting in Cybersecurity Calamities and Lurking Attacks
The role of IT in defending against cyberattacks is more difficult than ever. It becomes even more challenging when IT departments are forced to tackle the lack of willingness by employees to take precautionary steps against attacks, according to the latest results from the A10 Networks Application Intelligence Report (AIR). Based on research involving more […]
10 With A10: 10 Security Predictions for 2018
10 With A10: 10 Security Predictions for 2018 In the 1970s, the Amazing Kreskin wowed audiences with his uncanny ability to see the future. Using suggestion, he’d make predictions. While Kreskin would stop short of calling himself a psychic – instead choosing to be considered an entertainer – his predictions often came true. Today, we’re […]
A10 CEO Lee Chen on CNBC: The Cybersecurity Cat and Mouse Game
The frequency, size and volume of cyberattacks will increase in 2018, said A10 Networks CEO Lee Chen during an appearance this week on CNBC. Expect more and larger hacking cases next year from CNBC. According to Chen, 2018 will see a rise in the amount of financially and politically motivated attacks and especially DDoS attacks. […]