Tom Bienkowski
Director, Product Marketing
NETSCOUT Product Marketing Director Tom Bienkowski has been involved in the network and security field for more than 20 years. During his tenure in the industry, he has worked for large enterprises as a network engineer as well as for multiple network management and security vendors in sales engineering/management, technical field marketing, and product management roles. In his current role as director of product marketing at NETSCOUT, he focuses on NETSCOUT’s industry-leading DDoS protection solutions.
Blog Posts
- —Confirmed: NETSCOUT Arbor DDoS Protection Solution Has a 223% ROI and Reduces MTTR by 85%
- —The Business Impact of Cybersecurity (Part Two)
- —The Business Impact of Cybersecurity (Part One)
- —Why Endpoint Detection and Response Is Not Enough
- —Two Simple Ways to Thwart DDoS Attacks
- —What Are the Weak Links in the Connectivity Supply Chain—and Why Is NETSCOUT Seeing So Many More Attacks?
- —What Is the Connectivity Supply Chain, and Why Do Attackers Care?
- —Collaboration Makes the Cybersecurity Dream Work
- —Four Network Security Challenges to Watch For
- —Digital Transformation Opens Door to Stateful DDoS Attacks
Videos and Webinars
- —Blocking Ransomware Attack with Arbor Edge Defense—Video
- —Webinar: Microsoft RDP, DNS and Other Protocols are Exploited in DDoS Extortion Campaign—Webinar
- —Ransomware & DDoS Extortion Attacks in Healthcare—Video
- —The Growing Risk of DDoS Attacks—Webinar
- —Scaling security at the Internet edge with stateless technology—Webinar
- —The Growing Risk of DDoS Attacks—Webinar
Articles
- —Information security during COVID-19 and the era of remote care: Challenges and safety measures for health systems
- —Security Magazine (US): Protecting VPNs from DDoS Attacks in the Age of Remote Work
- —TechRepublic (US): Global internet traffic patterns have risen dramatically
- —Cyber Defense Magazine (US): Fighting Back Against Powerful New DDoS Attack Vectors
- —Cyber Defense Magazine (US): Fighting Back Against Powerful New DDoS Attack Vectors