The RLT Blog - Page 15 of 16 - Root Level Technology

The RLT Blog - Page 15 of 16 - Root Level Technology

Should Your Business Deploy A Modular Data Center?

Traditionally, deploying a data center isn’t the sort of thing just anyone can handle. It’s an extensive, laborious process, requiring a massive cost investment, a healthy dollop of technical knowledge, and a plethora of rules and regulations to navigate. Small wonder that most organizations tend to shy away from operating their own – and that many of the ones that do usually aren’t the best at it. But there’s been a trend growing in the data center industry for the past several years: the data-center-in-a-box. Operating out of a unit that looks more like a storage crate or shipping container, these solutions are easy to deploy, easy to spin down, and extremely portable – factors which make them ideal for […]

Continue reading

How Worried Should You Be About Dynamic IPs?

One of the oldest, most tried-and-true methods of defeating a DDoS attack is by blocking the IP addresses used to execute it. Unfortunately, criminals are acutely aware of that fact – and in response, they’ve begun launching their attacks through a completely different vector: Layer 7, the application layer. By using real IP addresses, they’re able to establish a three-way TCP handshake, bypassing both cookies and JavaScript. Worse still, many of these attacks have grown surprisingly complex, implementing human like browsing behaviors, patterns, and timing. This means that the larger the attacks are, the more difficult they are to detect.  And IP-based defense systems cannot effectively tell the difference between these attacks and legitimate visitors – meaning that if they’re […]

Continue reading

Where Do You Draw The Line Between Manual And Automated Security?

In a recent survey, Radware found that attacks that last only an hour or less are on the rise – and more than half of the three biggest attacks fell into that category. The implications of these findings are clear. It’s likely that very soon, even long attack campaigns will be based on short bursts of traffic – bursts which are difficult, if not impossible, for humans to effectively mitigate. The issue here is that even the most skilled IT professionals need time to deploy detection technologies and choreograph their responses. Existing solutions often require a heavy degree of manual intervention – which means they’re ill-suited to effectively react to the fast pace of modern attacks. That’s where automation comes […]

Continue reading

How The Digital Attack Landscape Will Change In 2016

By now, digital crime has become so commonplace that news of a new attack is often met with the same level of excitement as a weather report. Unfortunately, this constant influx of bad news masks another, more insidious reality in this horrible state of affairs – cyber-attacks are changing. Like every tech-related industry, cyber-crime is in a state of continual evolution. Knowing where this evolution might take us is the first step to defending ourselves against it. So with that in mind, here are a few ways cyberattacks will likely evolve in 2016 – and what that means for you as we move towards 2017. APDoS Attacks Rise to Prominence Advanced persistent denial of service attacks – essentially massive DDoS […]

Continue reading

Bots Are Getting More Advanced – Are You Prepared To Deal With Them?

The days when you could be certain there was a human presence on the other end of a cyberattack are behind us. Bot-generated attacks targeted at web infrastructure have of late grown increasingly prevalent, and increasingly more sophisticated. The different attack vectors and risk profiles are similarly expanding. In short, bots are getting better at ruining your day, and they’re becoming much more difficult to detect and mitigate. Is there anything you can do? How can you guard your assets from attackers that employ these tools against you? What Bad Bots Do By far, the most common type of bot in operation today is the comment spammer – you’re no doubt familiar with them if you’ve spent even a marginal […]

Continue reading