WHITE PAPERS

Cybersecurity issues for enterprise executives and IT managers

White Papers

icon-whitepaper
The Forrester Wave: DDoS Services ProvidersAkamai’s DDoS mitigation solutions received high marks for alert notification, response tactics, size and breadth of attacks against which it can defend, and defended network protocols and defense tactics prior to an attack, among other factors.
icon-whitepaper
Ponemon Institute Report: The Cost of Web Application AttacksPonemon Institute surveyed 594 IT professionals about 16 web application security topics, including their experiences with costs of web application attacks and the resources needed to manage web application firewalls (WAFs) properly.
icon-whitepaper
How to Evaluate DDoS Mitigation Providers: Four Critical CriteriaThe DDoS mitigation services marketplace is growing, but not all new providers have the bandwidth and expertise to guarantee robust protection. Get the right questions—and the right answers—for prospective DDoS mitigation providers.
icon-whitepaper
Ponemon Institute Report: The Cost of Denial-of-Services AttacksPonemon Institute surveyed 641 security and IT professionals about their experiences with denial of service attacks and defense at their organizations, to provide an understanding of the cost and consequences of these security threats.
icon-whitepaper
Weighing Risk Against the Total Cost of a Data Breach: Can You Afford a Web Application Layer Attack?Learn why protecting your customers’ personal data is a critical consideration in your business’s cyber-attack DDoS protection and mitigation strategy.
icon-whitepaper
Web Vulnerabilities: The foundation of the most sophisticated DDoS campaignsLearn how web application vulnerabilities put your server installations at risk of exploitation and use in DDoS botnets.
icon-whitepaper
DDoS Attacks Against Global MarketsThis analysis of global DDoS attacks indicates cyber-attackers are using DDoS attacks to influence market values and interfere with exchange platforms.
icon-whitepaper
Reflection Attack Tools and the DDoS MarketplaceNew methods, tools and services, including CHARGEN-based attacks, are proliferating in the DDoS marketplace, fueling a surge in DrDoS attacks.
icon-whitepaper
Multiplayer Video Gaming Attacks (A DrDoS Series White Paper)DrDoS and DDoS attacks involving the online video gaming community are widespread and harm gaming and non-gaming targets alike.
icon-whitepaper
SYN Reflection Attacks (A DrDoS Series White Paper)SYN reflection attacks are potent and unmanned DDoS mitigation devices can create backscatter, compounding the effects of the attack.
icon-whitepaper
SNMP, NTP & CHARGEN Attacks (A DrDoS Series White Paper)The network protocols SNMP, NTP and CHARGEN are being leveraged by cyber attackers. Even printers are at risk!
icon-whitepaper
DNS Reflection Attacks (A DrDoS Series White Paper)DNS server and IT administrators, get prepared by learning how cyber-attackers use domain name (DNS) servers to reflect and amplify DDoS attacks to hit their ultimate target.

Contact Us