Tag: ddos
Five Requirements for Protecting APIs Against Attacks
API security is not a new problem; APIs and their vulnerabilities have been around a long time....
VIEW MOREHow We Were Able to Help Our Customers With the Log4j 0Day
Many security teams are still working overtime to patch and protect against any log4j-related...
VIEW MOREWhy Signature-Based Detection Struggles to Keep Up With the New Attack Landscape
Change is an inherent part of cybersecurity as attackers constantly look for new ways to evade and...
VIEW MORECredential Stuffing, DDoS Attacks, Bots, and More Create a Formidable Iceberg of Risk
Sometimes you see a threat coming and have time to prepare – like a forecasted hurricane....
VIEW MOREHow to Overcome Credit Union Cybersecurity Challenges
Credit unions have a unique set of cybersecurity challenges stemming from their size, mission, and...
VIEW MORENew Research: Bot and DDoS Attacks on the Rise
Cybersecurity is changing fast. Just glance at the breach headlines, and you’ll most certainly...
VIEW MOREIf all you have is a hammer…
…Everything looks like a nail. There are over a five billion unique user credentials...
VIEW MOREDDOS attacks and the 2020 election
Ed Amoroso, Chief Executive Officer of TAG Cyber LLC, a global cyber security advisory, training,...
VIEW MOREThe Many Faces of Bad Bots
Bad bots and malicious automation are one of the few technology challenges that can materially...
VIEW MORETop 4 Malicious Automation Attacks & How to Detect Them
We first introduced malicious automation in Part I of this blog series. We shared how malicious...
VIEW MOREEnhanced Edge Caching, Site Profiling, and Bot Capabilities
Based on analysis of existing data, feedback from customers, and thought leadership insights,...
VIEW MORE