IT Management  >   Systems Operations  >   Security  >   Network Security  >  

DDoS Attacks

RSS Feed    Add to Google    Add to My Yahoo!
DDoS Attacks Reports
Stop DDoS Attacks with DNS Protection
sponsored by EfficientIP
WHITE PAPER: Access this white paper now to read about effective DNS protection and to learn how you can shield yourself from DDoS attacks.
Posted: 09 Mar 2015 | Published: 31 Dec 2014


Hammertoss: How a Cyber-Threat Militia Hacks Into Networks Using Twitter
sponsored by FireEye
WEBCAST: This special network security webinar will guide you through an in-depth analysis of Hammertoss and its particulars as a concern to network security View now to delve into the specific inner workings of Hammertoss and the 5 stages of its attack.
Posted: 28 Sep 2015 | Premiered: Sep 16, 2015


October 2015: DDoS Attacks & Protection Report: North America & EMEA
sponsored by Neustar®
WHITE PAPER: This white paper examines DDoS attacks within the last 6 months and reveals key information to learn how to protect your network against determined cybercriminals. View now to learn why you should worry more about low-and-slow attacks rather than a tidal wave DDoS attack.
Posted: 12 Oct 2015 | Published: 29 Sep 2015


2012 Cost of Cyber Crime Study: UK
sponsored by
RESEARCH CONTENT: The 2012 Cost of Cyber Crime Study: United Kingdom is independently conducted by Ponemon Institute. The benchmark study, sponsored by HP Enterprise Security is based on a representative sample of 38 organisations in various industry sectors.
Posted: 25 Oct 2012 | Published: 25 Oct 2012

Website Security Threat Report Part 1
sponsored by Symantec Corporation
WHITE PAPER: This website security threat report will give enterprises, small businesses and consumers essential information to help secure their systems from threat vulnerabilities. Continue reading to access emerging trends in attacks, malicious code activity, phishing, and spam.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Symantec Corporation

Case Study: A Profile of Cyber-Extortion
sponsored by Akamai
WHITE PAPER: This white paper provides an in-depth look at a cyber-extortion group, showing you what their attacks look like and what you can do to stop them.
Posted: 17 Sep 2015 | Published: 09 Sep 2015


Features of a Comprehensive Application Security Solution
sponsored by Citrix
WHITE PAPER: This white paper discusses the features of a comprehensive application security solution.
Posted: 07 Jun 2010 | Published: 07 Jun 2010


Mega-DDoS Attack Prevention: How to Prepare for Larger DDoS Attacks
sponsored by F5 Networks
EGUIDE: In this e-guide, leading industry expert Brad Casey explains the mechanics behind high-bandwidth distributed denial of service (DDoS) attacks and key recommendations on how to prevent them.
Posted: 29 Jan 2014 | Published: 29 Jan 2014

F5 Networks

Financial Institutions, Merchants, and the Race Against Cyberthreats
sponsored by RSA
WHITE PAPER: In this white paper, learn about the 4 top forms of cybercrime. Click through to reveal 6 key recommendations to best protect your organization from security breaches.
Posted: 02 Apr 2014 | Published: 31 Oct 2013


DNS Firewalls and Defense Tactics
sponsored by Infoblox
EGUIDE: Gain an in-depth look at today's most popular domain name system (DNS) attacks and the defense tactics against them. In addition, uncover how a DNS firewall can help keep your organization safe.
Posted: 18 Feb 2013 | Published: 18 Feb 2013

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement