June 2016 - Root Level Technology

Archive: June 2016 - Root Level Technology

Where Do You Draw The Line Between Manual And Automated Security?

In a recent survey, Radware found that attacks that last only an hour or less are on the rise – and more than half of the three biggest attacks fell into that category. The implications of these findings are clear. It’s likely that very soon, even long attack campaigns will be based on short bursts of traffic – bursts which are difficult, if not impossible, for humans to effectively mitigate. The issue here is that even the most skilled IT professionals need time to deploy detection technologies and choreograph their responses. Existing solutions often require a heavy degree of manual intervention – which means they’re ill-suited to effectively react to the fast pace of modern attacks. That’s where automation comes […]

Continue reading

How The Digital Attack Landscape Will Change In 2016

By now, digital crime has become so commonplace that news of a new attack is often met with the same level of excitement as a weather report. Unfortunately, this constant influx of bad news masks another, more insidious reality in this horrible state of affairs – cyber-attacks are changing. Like every tech-related industry, cyber-crime is in a state of continual evolution. Knowing where this evolution might take us is the first step to defending ourselves against it. So with that in mind, here are a few ways cyberattacks will likely evolve in 2016 – and what that means for you as we move towards 2017. APDoS Attacks Rise to Prominence Advanced persistent denial of service attacks – essentially massive DDoS […]

Continue reading

Bots Are Getting More Advanced – Are You Prepared To Deal With Them?

The days when you could be certain there was a human presence on the other end of a cyberattack are behind us. Bot-generated attacks targeted at web infrastructure have of late grown increasingly prevalent, and increasingly more sophisticated. The different attack vectors and risk profiles are similarly expanding. In short, bots are getting better at ruining your day, and they’re becoming much more difficult to detect and mitigate. Is there anything you can do? How can you guard your assets from attackers that employ these tools against you? What Bad Bots Do By far, the most common type of bot in operation today is the comment spammer – you’re no doubt familiar with them if you’ve spent even a marginal […]

Continue reading

How Can High-Risk Industries Defend Themselves From DDoS Attacks?

No one is immune to cyberattacks. As technology continues to march forward and more critical data is stored online, more criminals than ever are targeting businesses through digital vectors. The threat landscape has never been more diverse, nor has the risk of an attack ever been higher. It is extremely difficult to mount a defense on all fronts. A business that’s well-equipped to protect against worms and malware, for example, may not be able to mitigate advanced persistent threats or information theft. Similarly, a business that’s geared to prevent information theft might not have proper DDoS defenses in place. Attackers know this, and many now target multiple vectors when attacking an organization. All they need is for one vector to […]

Continue reading

Five Things You Need To Know About Hacktivism

Not all cyber-attacks are financially motivated. In the modern day, an increasing number of digital attacks are carried out with the intent of delivering a message. The cyber-criminals behind such attacks — dubbed ‘hacktivists’ — are many and varied, and there are many shades of gray where their motivations are concerned. They’re not out for money, and they can be more persistent than even the greediest hacker. Of course, if your business is unlucky enough to find itself the target of a hacktivist, the ‘why’ of an attack doesn’t matter so much as the ‘how’ of mitigating it and coming through intact. In that regard, the first step is a better understanding of what hacktivists are and how they operate. […]

Continue reading