NETWORK THREAT DETECTION

Radware and CHT Security Team Up to Protect NCSoft Taiwan’s Product Launch During Massive DDoS Attacks

Radware | December 02, 2021

Radware and CHT Security Team Up to Protect NCSoft Taiwan’s Product Launch During Massive DDoS Attacks
Radware a leading provider of cyber security and application delivery solutions, today announced that CHT Security, selected Radware’s DefensePro DDoS Protection solution to safeguard gaming publisher NCSoft Taiwan from massive DDoS attacks during a very popular game launch. CHT Security is Taiwan’s leading managed security service provider and a subsidiary of Chunghwa Telecom, the largest telco in Taiwan.

Supported by Radware’s data center protection and CHT Security’s comprehensive professional services, the leading global gaming company was able to mitigate the DDoS attacks and introduce its new game without incident.

“As we’ve expanded our business, we’ve seen a large increase in DDoS attacks in Taiwan in recent years,” said Jeff Hung, general manager for CHT Security. “Based upon our long-standing, positive experience, we selected Radware to ensure NCSoft Taiwan’s successful product launch and have increased the use of DefensePro to support our business. The key success factor to this joint effort is the combination of CHT Security’s defense expertise in real-time tuning and the cutting-edge features of Radware’s DefensePro to deliver high-quality and low-latency defense services against cyber threats.”

According to Radware’s recently published Q3 DDoS and Application Attack Report, the number of DDoS attacks blocked during the first nine months of 2021, already exceeded the total number of malicious events blocked in 2020. Gaming and telecom endured the highest attack volumes, accounting for over 50% of the total blocked volume in the third quarter of 2021.

“DDoS attacks are becoming more frequent, sophisticated, and dangerous,With the growing availability of attack tools and botnets, organizations need multi-layered DDoS protection backed by expert emergency response teams. We value our trusted relationship with CHT Security and are excited that it has chosen to safeguard its customers with our solutions.”

Yoav Gazelle, vice president of international sales for Radware

Radware’s DefensePro provides automated DDoS defense and protection from fast moving, high volume, encrypted, or very short duration threats. It defends against IoT-based, Burst, DNS, and TLS/SSL attacks to secure organizations against emerging network multi-vector attacks, ransom DDoS campaigns, IoT botnets, and other types of cyber-threats.

About CHT Security
Founded in 2017, CHT Security is a subsidiary company of Chunghwa Telecom, the largest telco in Taiwan. CHT Security is now the leading managed security service provider in Taiwan with rich experiences in information defense practices, and the R&D capabilities to deliver cyber security services and solutions, including security testing, SOC monitoring, incident response, and digital forensics, satisfying cybersecurity needs for enterprises and government institutions. CHT Security is ISO 20000, ISO 27001, and ISO 17025 certified, and was awarded the 2021 Taiwan Managed Security Services Company of the Year Award by Frost & Sullivan.

About Radware
Radware is a global leader of cyber security and application delivery solutions for physical, cloud, and software defined data centers. Its award-winning solutions portfolio secures the digital experience by providing infrastructure, application, and corporate IT protection, and availability services to enterprises globally. Radware’s solutions empower enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity, and achieve maximum productivity while keeping costs down.

Spotlight

The key message: Organizations must recognize that DDoS attacks come in many forms. Characterizing all DDoS attacks as merely floods of site traffic is a common mistake too many financial institutions make, he says. When institutions limit their views of what DDoS attacks comprise, they hinder their abilities to detect and prevent the attacks, and, possibly, to detect and prevent fraud.

Related News

Operational resource aimed at helping small newsrooms shore-up their cybersecurity practices

prnewswire | October 15, 2020

Today the Global Cyber Alliance (GCA) released the GCA Cybersecurity Toolkit for Journalists at the 2020 Online News Association conference. The toolkit is a free, operational resource aimed at helping journalists, watchdogs, and small newsrooms shore-up their cybersecurity practices. Journalists around the world have long been targets of cyber attacks, whether reporting on crime, politics, or simply being a target for the spread of disinformation. Recent examples include an Angolan journalist reporting on the embezzlement of public funds and two Turkish journalists whose accounts and devices were compromised after reporting on the death of Turkish soldiers in Libya. In order to provide some practical resources to manage these risks, GCA assembled a set of tools that journalists can use to shore up their cyber defenses, protect their devices and data, and help safeguard their online presence.

Read More

SOFTWARE SECURITY

To address the increasing demand for sensitive data protection, Netwrix and Stealthbits merge to address

prnewswire | January 04, 2021

Netwrix, a network safety merchant that makes information security simple, today declared a consolidation with Stealthbits, a network safety pioneer that shields delicate information and qualifications from assailants. The joined substance will keep on contribution its total arrangement of in excess of about six security arrangements pointed toward recognizing and distinguishing information security hazard just as ensuring, reacting and recuperating from network safety assaults. Terms of the exchange were not uncovered. Divided arrangements in the information security market keep associations from building thorough security techniques to ensure their delicate and managed information. To address this test, Netwrix and Stealthbits are uniting to use each other's mastery to widen item abilities and improve client experience. This will empower the consolidated association to offer seven center items crossing all components of information and data security, put resources into development to surpass the assumptions for existing clients and accomplices, and grow its client base worldwide. With more than 500 representatives and clients from in excess of 50 nations, the consolidated organization will work as Netwrix with Steve Dickson proceeding to fill in as its CEO and on the organization's Board of Directors. Steve Cochran, organizer and administrator of Stealthbits, will be a speculator in Netwrix and will serve on its Board of Directors. "We couldn't be more thrilled to be merging with the people and products of Stealthbits. Our combined organization can now offer data security solutions for any organization anywhere in the world," said Steve Dickson, CEO at Netwrix. "Stealthbits has always been driven to work with our customers to solve their most challenging credential and data security requirements. Combining our breadth of products and depth of expertise with that of Netwrix means our customers can quickly strengthen their security posture and address multiple projects and requirements through a single provider," said Steve Cochran, founder and chairman of Stealthbits. For a long time to come, clients, prospects and accomplices of each organization will keep on collaborating with each organization as they do today for deals, backing and accomplice action. Both Netwrix and Stealthbits are focused on straightforwardness and will educate their clients, prospects and accomplices of operational changes through this cycle throughout the next few months. About Netwrix Netwrix makes data security easy, thereby simplifying how professionals can control sensitive, regulated and business-critical data, regardless of where it resides. More than 10,000 organizations worldwide rely on Netwrix solutions to secure sensitive data, realize the full business value of enterprise content, pass compliance audits with less effort and expense, and increase the productivity of IT teams and knowledge workers. Founded in 2006, Netwrix has earned more than 150 industry awards and been named to both the Inc. 5000 and Deloitte Technology Fast 500 lists of the fastest growing companies in the U.S. About Stealthbits Stealthbits Technologies, Inc. is a customer-driven cybersecurity software company focused on protecting an organization's sensitive data and the credentials attackers use to steal that data. By removing inappropriate data access, enforcing security policy, and detecting advanced threats, we reduce security risk, fulfill compliance requirements, and decrease operational expense.

Read More

COVID-19 Pandemic Moves Organizations to Increase Cybersecurity Spending

Cisco | May 22, 2020

Coronavirus crisis creating new opportunities for cybercriminals, 70 percent of organizations are seeing the value of increasing their investments in cybersecurity solutions. The challenge for many organizations is continuing to accomplish their security must-dos with significantly less resources. It’s important for security providers to understand that their goal is to help an organization maintain security continuity during this period, not to replace their teams long term. With coronavirus crisis creating new opportunities for cybercriminals, 70 percent of organizations are seeing the value of increasing their investments in cybersecurity solutions. According to a LearnBonds.com report, besides boosting their cybersecurity spending, as the top IT priority this year, around 55 percent of major organizations will boost their investments in automation solutions, revealed HFS Research survey conducted in April. Smart analytics, hybrid or multi-cloud and artificial intelligence follow, with 53 percent, 49 percent and 46 percent of those bodies asked naming them as their leading IT investments this year. The statistics show spending on augmented and virtual reality technology, blockchain and edge computing is under pressure this year, with just 32 percent, 30 percent and 27 percent of enterprises planning to increase their spending on these technologies in 2020. Though recent years have witnessed a surge in the use of artificial intelligence, helping businesses to improve their efficiency, quality and speed, statistics show artificial intelligence solutions are set to witness a massive drop in spending this year, with 23 percent of major enterprises planning to cut their investments on these technologies. Blockchain follows with an 18 percent share among those asked downsizing their IT budgets. However, data revealed IT vendors are much more optimistic about their clients spending on AI technology, with 59 percent of respondents expecting increased investments this year. Jack Mannino, CEO at nVisium, says, “The challenge for many organizations is continuing to accomplish their security must-dos with significantly less resources. Learn more: SINGLE LAYERS OF SECURITY AREN’T ENOUGH TO PROTECT YOUR ORGANIZATION’S DATA . "Employees working from home are using their personal mobile devices to connect to home networks, which means traditional perimeter-based security tools no longer provide visibility or control for security teams. CISOs are adapting to provide endpoint security to all devices in this new normal, to enable teams and organizations to get back to business." ~ Cisco Team Relying on a pool of trusted security partners is critical, as niche skills or deep expertise may come from external sources when internal headcount is constrained. Historically, companies have increased their security outsourcing in periods where it’s hard to justify increasing or maintaining internal head count. It’s important for security providers to understand that their goal is to help an organization maintain security continuity during this period, not to replace their teams long term.” Budgets will have more scrutiny than ever before, however, a risk-based approach is still required. Non-essential spending should be pushed back, but it would be foolish to stop mitigating risks in the near term. "CISOs were focused on endpoint protection for traditional work devices like laptops. In a remote work world, cybersecurity tools must protect all devices employees connected to corporate cloud data - in particular mobile devices," Historically, cybersecurity is a sector where spending still occurs, even when the economy dips. There are risks to smaller and emerging firms, but sales revenue and the amount of capital raised provides resilience. To avoid going under, startups must have enough funds to cover operating expenses over the next few months to survive the COVID-19 storm.” Steve Durbin, managing director of the Information Security Forum, cautions about organizations reducing their cyber workforce at a vulnerable time. “It is more likely that businesses will be exposed because they neither have in-house, nor external access to the necessary skills to deliver their business operations with a remote workforce. I don’t see a short term altering of spending, but clearly this will come for many organizations as the COVID-19 crisis continues. It would extremely short sighted for business leaders to reduce cybersecurity staff and budget at a time when the majority of the workforce is critically dependent on cyber to function. Fausto Oliveira, Principal Security Architect at Acceptto, agrees reducing cybersecurity and IT staff would affect the well-being of systems in place and the security of remote workers. “Losing cybersecurity and IT staff increases the risk of a successful attack during the COVID-19 pandemic and may impair the ability of a company to sustain the large volume of remote workers. MSSPs are certainly a good choice when the financial cost of the cybersecurity function exceeds what the company can afford. I imagine that if the current scenario of personnel working from home remains in place for the long-term, then we will see a surge in the usage of MSSPs to address security gaps and act as a virtual cybersecurity function.” Bob Stevens, Vice President, Americas at Lookout, warns the move to a remote workforce has changed the security attack surface for every organization. Learn more: HOW CSOS CAN PROTECT USERS FROM PHISHING ATTACKS RELATED TO COVID-19 .

Read More

Spotlight

The key message: Organizations must recognize that DDoS attacks come in many forms. Characterizing all DDoS attacks as merely floods of site traffic is a common mistake too many financial institutions make, he says. When institutions limit their views of what DDoS attacks comprise, they hinder their abilities to detect and prevent the attacks, and, possibly, to detect and prevent fraud.