IT Management  >   Systems Operations  >   Security  >   Network Security  >  

DoS Attacks

RSS Feed    Add to Google    Add to My Yahoo!
DoS Attacks Reports
 
Information security breaches survey 2012
sponsored by ComputerWeekly.com
IT BRIEFING: Rising security breaches cost UK billions over the last 12 months as cyber attacks reached record levels, according to the 2012 Information Security Breaches survey.
Posted: 24 Apr 2012 | Published: 24 Apr 2012

ComputerWeekly.com

Cyber Risk Perceptions: An Industry Snapshot
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Concerns about cyber-risks in business have increased over the past 12 months, this snapshot survey from Marsh and Chubb reveals.
Posted: 27 Jun 2012 | Published: 27 Jun 2012

ComputerWeekly.com

Akamai Shields Leading Retailer from Ddos Attacks During Critical Holiday Shopping Period - and Protects $10 Million in Revenues
sponsored by Akamai Technologies
CASE STUDY: In this case study, learn how one online retailer was able to maintain online operations and protect $10 million in revenue by implementing Akamai’s DDoS Defender Security Solution and utilizing Akamai Intelligent Platform to deflect and reflect malicious attacks.
Posted: 04 Apr 2012 | Published: 04 Apr 2012

Akamai Technologies

Businesses Blame Rivals for DDoS Attacks& The Importance of Cloud WAF
sponsored by F5 Networks
EGUIDE: More than 40% of businesses hit by a DDoS attack believe their competitors were behind it, according to research by Kaspersky Lab and B2B International. But is there truth behind this suspicion? In this expert e-guide, learn ]about the real culprits behind DDoS attacks, and get some insight into the emergence of cloud WAF for application security.
Posted: 04 May 2017 | Published: 01 May 2017

F5 Networks

Top 5 DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 15 Aug 2013 | Published: 31 May 2013

Infoblox

Cybersecurity Lessons from 2014
sponsored by IBM
WHITE PAPER: In this special security report, discover what lessons can be learned from 2014's cyber-breaches to improve cybersecurity in 2015.
Posted: 17 Apr 2015 | Published: 31 Mar 2015

IBM

Unified Threat Management (UTM) Solutions
sponsored by SonicWALL
WHITE PAPER: This series of technical briefs examines the key factors you need to consider regarding unified threat management (UTM) solutions as they impact security, performance, management, and consolidation.
Posted: 05 Dec 2007 | Published: 01 Dec 2007

SonicWALL

Denial-of-Service (DoS) Secured Virtual Tenant Networks (VTN)
sponsored by NEC Corporation of America
WHITE PAPER: This crucial paper discusses the evolution of DDoS attacks and examines an SDN solution that detects and mitigates potential attacks almost instantly, ensuring that your network is kept up and running.
Posted: 03 Jun 2014 | Published: 03 Jun 2014

NEC Corporation of America

The Cybercrime Arms Race
sponsored by Kaspersky Lab
WHITE PAPER: Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.
Posted: 18 Feb 2008 | Published: 01 Feb 2008

Kaspersky Lab

Leveraging Cloud Security to Weather Threatening Storms: How to Defend Your Perimeter from Today's Outsized Threats
sponsored by Akamai Technologies
WHITE PAPER: With rapid growth and complexity of today’s threats, traditional perimeter defenses are no longer enough to keep pace. This resource explores the current threat environment and how leveraging cloud-based security services can be a proactive and effective means to protecting against ever-evolving, modern day threats.
Posted: 04 Apr 2012 | Published: 04 Apr 2012

Akamai Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement