227 results
DDoS Center Stage Global Threat Landscape
/ Gary Sockrider

DDoS Takes Center Stage on the Global Threat Landscape

NETSCOUT’s biannual DDoS Threat Intelligence Report dissects trends and attack methodologies adversaries use against service providers, enterprises, and end users. The information...

  • DDoS
True Network Security Requires Hybrid or Layered Approach
/ Michael Wetherbee

True Network Security Requires a Hybrid or Layered Approach

Whether in government, financial, manufacturing, or other sectors, misconceptions persist regarding the best way large organizations can protect themselves from distributed denial...

  • DDoS
Latest Feature Release NETSCOUT Expanding Visibility and AI
/ NETSCOUT

Latest Feature Release from NETSCOUT: Expanding Visibility for AI Transformation

NETSCOUT’s 6.3.5 update includes a host of enhancements, including new automation capabilities, extended visibility into new environments, and continued data innovation. At...

  • DDoS
  • Enterprise
Understanding Attack Traffic is Required for Building DNS Protection
/ Michael Wetherbee

Understanding Attack Traffic Is Required for Building a DNS Protection Strategy

Last week my daughter lost her phone. Due to this unfortunate event, she also lost the ability to call or message anyone she knew on another device because she did not know anyone...

  • DDoS
  • Security
Security Stack Efficiency Depends on Focused Feature Usage
/ Michael Wetherbee

Security Stack Efficiency Depends on Focused Feature Usage

Many networks in today’s interconnected world suffer from overexposure to excessive nuisance and sometimes malicious traffic, even if they are not the target of that traffic. This...

  • DDoS
network-visibility-and-ddos-attack-analysis-are-essential
/ Michael Wetherbee

Network Visibility and DDoS Attack Analysis Are Essential in Identifying and Mitigating Adversarial Attacks

All methods of distributed denial-of-service (DDoS) attack analysis—whether proactive, or in preparation for a DDoS attack; reactive, or during a DDoS attack; or even in post...

  • DDoS
  • Security