DDoS Malware: A Research Paper

Distributed denial of service (DDoS) malware and tools threaten an organization's Internet-facing systems. This technical brief covers DDoS-enabled malware and several DDoS-specific tools, their capabilities and the network indicators they generate while performing the attack methods. It includes new attack vectors observed in 2013 with regard to highly publicized and targeted DDoS attacks.

Spotlight

Cavirin

While data security once meant securing the physical datacenter, the cloud has expanded the IT ecosystem’s perimeter in a literal (but amorphous) way, creating a conundrum: how can you secure something you can’t quite see or measure? While robust solutions for datacenter security and compliance have long since existed, the cloud is still “Wild West” territory. While many vendors say their products address cloud “security,” there seems to be no common definition of the term. Some of these tools fill a specific gap—encryption or vulnerability scanning, for example.

OTHER WHITEPAPERS
news image

Cyber Security in the AC500 PLC family

whitePaper | February 7, 2023

ABB offers a comprehensive range of scalable PLCs and robust HMI control panels. Since its launch in 2006, the AC500 PLC platform has achieved significant industry recognition for delivering high performance, quality and reliability. Cyber Security has become of key importance for ABB customers and ABB alike. In order to help protect ABB customers as well as our brand, cyber security must be an important aspect in our products, systems, projects and service deliveries.

Read More
news image

2020 Cyber Security Predictions

whitePaper | January 28, 2020

This year there are some common themes that endure, so we’ll highlight these as “work in progress”. Transformations often take longer than 12 months to be identifi ed as necessary, to be executed and to become established. However, there are other themes emerging through a combination of drivers from audit, compliance security and governance that are now showing signs of infl uencing the way that cyber risks are managed in a much shorter timescale.

Read More
news image

How MX Protects Your Data

whitePaper | December 22, 2022

MX’s approach to security includes a defense-in-depth strategy. This strategy is supported by an established, operational MX Security Program, with a robust suite of governing policies, processes, security controls, and procedures to achieve MX’s security strategy. MX enacts defense in depth by hardening each layer of MX’s infrastructure and supporting processes.

Read More
news image

XDR vs. SIEM: A Cybersecurity Leader’s Guide

whitePaper | December 27, 2022

As threats intensify and SecOps teams are called upon to defend digital environments that keep growing in size and complexity, and with a defensible perimeter that has all but disappeared, cybersecurity vendors are responding with a new generation of software and service solutions.

Read More
news image

Darktrace Cyber AI Analyst: Autonomous Investigations

whitePaper | February 9, 2023

This white paper examines the technology and design principles behind Darktrace's Cyber AI Analyst, a groundbreaking innovation that automates threat investigations at speed and scale.

Read More
news image

Managing the IT Modernization Elephant A bite-sized approach to digital modernization

whitePaper | June 15, 2022

There’s an old saying, “How do you eat an elephant? One bite at a time.” In some cases, the task of technology modernization is akin to eating an elephant. Government agencies are filled with legacy applications, many of which have been heavily customized over decades of operation.

Read More

Spotlight

Cavirin

While data security once meant securing the physical datacenter, the cloud has expanded the IT ecosystem’s perimeter in a literal (but amorphous) way, creating a conundrum: how can you secure something you can’t quite see or measure? While robust solutions for datacenter security and compliance have long since existed, the cloud is still “Wild West” territory. While many vendors say their products address cloud “security,” there seems to be no common definition of the term. Some of these tools fill a specific gap—encryption or vulnerability scanning, for example.

Events