Why Clean Pipe Is Not So Clean!

Why Clean Pipe Is Not So Clean

What is a Clean Pipe? A clean pipe is a type of DDoS mitigation solution for online businesses and websites that need real-time protection against volumetric DDoS attacks. The primary goal of the clean-pipe DDoS protection is to occlude network flood attack traffic before it enters an organization’s information network and to make sure that […]

An insight into DNS based DDoS Attack

An insight into DNS based DDoS Attack

Introduction: The DNS stands for the Domain Name System. This system translates memorized domain names to the numerical IP addresses required for locating the website with the underlying network protocols. The DNS service is highly redundant and has a multi-layered architecture. There are two types of DNS servers: authoritative and recursive. Authoritative DNS maps the domain name […]

2016- The year of cyber attacks

2016 – The year of Cyber Attacks

2016 was the most historic year ever for the cyber-attacks and discoveries of big vulnerabilities. The year has been littered with major data breaches, bank heists, account hijacking, hacktivism, website defacements, DDoS attacks and other social engineering attacks. A lot of havoc has been caused by cyber-criminals as they are more industrialized and more organized […]

The Threat of Cyber Attacks to India

The Threat of Cyber Attacks to India

India is among the top seven countries in the world to be attacked by cyber criminals. And industries in India are suffering from the threat of cyber-attacks with ever increasing usage of technology and digitization of the economy. Impact on Indian Businesses: IT leaders in India need to take cyber security as their number one […]

Cyber-Security Predictions for 2017

The rate of cyber attacks is never stopping! 2016 proved to be another year of devastating cyber-security breaches and other cybersecurity incidents spanning across multiple industries including SMEs and large-size enterprises from all over the world. There have been many sobering moments throughout the year, confirmatory yet again, that nobody is resistant to sophisticated cyber-attacks. […]