Denial of Service Attacks Research
-
Stopping application layer DDoS attacks: What you need to know
Sponsored by: TechTarget SecurityWhile a DDoS attack can be damaging to any organization, DDoS attacks specifically at the application-layer can be more ominous. Understanding these attacks are the first step to keeping your organization protected. In this e-guide, explore how DDoS is being used, what you can do to stop them, the future of the web threat landscape and more.
-
The real need for distributed denial-of-service protection: How to stop DDoS attacks
Sponsored by: TechTarget SecurityThis expert E-Guide discusses the immediate need for DDoS protection services and what you put at risk by not protecting your organization today. Uncover how these attacks work, the damage they can cause and best practices to stop them.
-
Akamai Shields Leading Retailer from Ddos Attacks During Critical Holiday Shopping Period - and Protects $10 Million in Revenues
Sponsored by: Akamai TechnologiesIn this case study, learn how one online retailer was able to maintain online operations and protect $10 million in revenue by implementing Akamai’s DDoS Defender Security Solution and utilizing Akamai Intelligent Platform to deflect and reflect malicious attacks.
-
Cisco CleanAir Technology
Sponsored by: Cisco Systems, Inc.Watch now to learn how you can balance anywhere, any device, any time access with the policy controls you need and also offering a high-quality end-user experience.
-
The Business Case for Managed DDos Protection
Sponsored by: Neustar®This whitepaper provides a snapshot of the evolving DDoS threat, provides guidance on what to look for in a managed DDoS solution and presents a financial cash-flow analysis scenario of an investment in a managed DDoS protection service.
-
State of DNS Availability Report
Sponsored by: Verisign, Inc.This domain name system (DNS) availability report illustrates the risks and impact that site downtime can have on revenue generation, business continuity, customer loyalty and more.
-
Threat Analysis: Understanding and Combating DDoS Attacks
Sponsored by: Dell SecureWorksThis analysis focuses on the types of attacks generally referred to as distributed denial-of-service, or DDoS, attacks. DDoS attacks are most often used to extort or damage businesses whose websites or online assets are a major source of revenue, are an indicator of brand value, or are critical to operations.
-
Approaches to Distributed Denial of Service (DDoS) Protection: A Cost Analysis
Sponsored by: VeriSign, IncDo you know what a Distributed Denial of Service (DDoS) attack might cost your organization? This white paper defines DDoS, examines the elements that make up a DDoS protection solution, and compares three different approaches to DDoS protection. Read this paper to learn how to ramp up protection and reduce costs.
-
Threatsaurus: The A-Z of Computer and Data Security Threats
Sponsored by: Sophos UKWhether you're an IT professional, use a computer at work, or just browse the internet, this book is for you. We tell you the facts about the threats to your computers and to your data in simple, easy-to-understand language.
-
The Cybercrime Arms Race
Sponsored by: KasperskyRead this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.
-
Methods, Motivations, and Mitigation of Insider Threats
Sponsored by: VeriSign, IncThis white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
-
Targeted Cyber Attacks
Sponsored by: GFI SoftwareCyber attack is the name given by (usually sensationalist) articles and documents describing crimes that occur in a virtual world as opposed to tangible attacks such as war.