Arbor Networks Corporate Blog

Visit this blog for regular insight from Arbor Networks on industry hot topics, company and product news

  • History doesn’t repeat itself but it often rhymes

    History doesn’t repeat itself but it often rhymes

    Taking a look back to the very first Worldwide Infrastructure Security Report (WISR) twelve years ago and of course, many things are vastly different. One thing is clear. Things are more complex...

    Read Article
  • A DDoS Attack Only Needs to Be as Large as “Your” Network Pipe

    A DDoS Attack Only Needs to Be as Large as “Your” Network Pipe

    As we look back over 2016, one of the most obvious stories will be the dramatic rise in the weaponization and size of DDoS attacks.  At the beginning of 2016 we noted the largest attack being...

    Read Article
  • Author observation on Arbor’s 12th annual Worldwide Infrastructure Security Report

    Arbor Networks 12th annual Worldwide Infrastructure Security Report provides direct insights from the global operational security community on a comprehensive range of issues from threat detection...

    Read Article
  • How ATLAS Enriches Arbor’s WISR

    How ATLAS Enriches Arbor’s WISR

    Next week Arbor Networks celebrates the release of the 12th edition of its popular Worldwide Infrastructure Security Report (WISR), which is primarily based upon a survey of individuals within the...

    Read Article
  • Higher Education’s Lessons on Cybersecurity

    Higher Education’s Lessons on Cybersecurity

    As my colleague discussed back in September, one of the widest ranging threats to an educational institution’s Information infrastructure today are Distributed Denial of Service (DDoS) attacks –...

    Read Article
  • Extracting Meaning and Knowledge of Big Data

    Extracting Meaning and Knowledge of Big Data

    We’re very pleased to announce  the availability of Arbor Networks SP Insight, our extension to the critically-acclaimed Arbor SP platform long-used by our customers for network traffic visibility...

    Read Article
  • Upcoming Webinar – DDoS Attacks: The Stakes Have Changed, Have You?

    Upcoming Webinar – DDoS Attacks: The Stakes Have Changed, Have You?

    Despite years of headlines, many businesses today are under-invested and ill-prepared to handle modern DDoS attacks. Many wrongly believe they are not being targeted by DDoS attacks, and are in...

    Read Article
  • Survey Says: Consumer Anxiety About Online Security Does Not Translate into Action

    Survey Says: Consumer Anxiety About Online Security Does Not Translate into Action

    Throughout this month, we have shared our thoughts on the various themes aligned with National Cybersecurity Awareness Month. This week’s theme is “Our Continuously Connected Lives: What’s Your...

    Read Article
  • Some Perspective on IoT Devices and DDoS Attacks

    Some Perspective on IoT Devices and DDoS Attacks

    Embedded Internet-of-Thing (IoT) botnets are not a new phenomenon – we’ve seen them leveraged to launch DDoS attacks, send spam, engage in man-in-the-middle (MitM) credentials hijacking, and other...

    Read Article
  • Annual Security Survey – Call for Participation

    Annual Security Survey – Call for Participation

    It’s that time again! Arbor Networks is opening its 12th annual Worldwide Infrastructure Security Report survey. Findings from this survey are compiled and analyzed to provide insights on a...

    Read Article
  • National Cyber Security Awareness Month

    National Cyber Security Awareness Month

    October is National Cyber Security Awareness Month and according to the U.S. Department of Homeland Security, “National Cyber Security Awareness Month is designed to engage and educate public and...

    Read Article
  • Network Traffic Analysis for Security: A “Market” on the Cusp of the Chasm?

    Network Traffic Analysis for Security: A “Market” on the Cusp of the Chasm?

    At Arbor, and at our parent company NETSCOUT, we talk a lot about the value that comes from Network Traffic. Traffic can bring end-to end visibility of all users, applications and services, their...

    Read Article
  • DDoS Attacks Are Coming Back to School

    DDoS Attacks Are Coming Back to School

    It is that time of year, where kids of all ages are heading back to school, with fresh, unwrapped school supplies in their backpacks with their smartphones, tablets, and laptops. Teacher and...

    Read Article
  • On Blank Stares, Reflecting Ears, and DDoS Attacks

    On Blank Stares, Reflecting Ears, and DDoS Attacks

    By Dr. Edward G. Amoroso, CEO of TAG Cyber LLC Whenever I get those dreaded blank stares from an audience having trouble understanding my clumsy description of the spoofing, reflection, and...

    Read Article
  • The Stakes Have Changed, Have You?

    The Stakes Have Changed, Have You?

    You’ll note a new image on our home page today with the headline “The Stakes Have Changed, Have You?” This is a new focus for our DDoS solution and part of the new look and feel of the Arbor...

    Read Article
  • The Beef with Malware Attacks

    The Beef with Malware Attacks

    A well-known fast food restaurant chain, famous for its burgers, was recently hacked and its Point-of-Sale (“POS”) system breached. The result: stolen customer information from more than 5,000...

    Read Article
  • How Do You Handle a Swarm of Threats Heading at You?

    How Do You Handle a Swarm of Threats Heading at You?

    If you saw a swarm of insects flying at you, what would you do?  Most likely you would be running away or remembering to duck and cover.  A swarm of insects has a lot of similarities to a botnet....

    Read Article
  • Getting Real About Rio: Physical Security is Not the Only Security to Worry About

    Getting Real About Rio: Physical Security is Not the Only Security to Worry About

    This month, the entire world is watching Rio. Amid police protests, violent crimes, terrorism threats, sanitation concerns, dangerous levels of viruses and bacteria in the water, major public...

    Read Article
  • The Escalating Role of Cyber Security in our Geopolitical World

    The Escalating Role of Cyber Security in our Geopolitical World

    In the information security world, we frequently speak of the three pillars of security: confidentiality, integrity, and availability. A viable security posture must take care to protect all...

    Read Article
  • Cyberhustle – Spotting the Classic Cons at BlackHat

    Cyberhustle – Spotting the Classic Cons at BlackHat

    I had a chance today with Scott Howitt to have a little fun at BlackHat.  I’ve always enjoyed the show over the years for many reasons, not least of which is avoiding taking ourselves too...

    Read Article
  • loading
    Loading More...