Large enterprises and service providers are investing heavily in distributed denial of service (DDoS) prevention hardware as attackers ramp up the intensity and frequency of their DDoS attacks.
Simple service discovery protocol (SSDP) reflection attacks have come out of nowhere to be a leading method for large volume DDoS attacks, according to data compiled by Arbor Networks.
Distributed denial of service attacks against enterprises are increasing in scale and frequency, prompting firms to invest in purpose-built DDoS mitigation tools. This will fuel a surge in the DDoS mitigation market by 2018, according to Frost & Sullivan.
The number and intensity of distributed denial of service attacks reached record levels in the first half of the year, according to the latest stats from DDoS mitigation firm Arbor Networks.
Security and data center vendors are increasing their focus on preventing distributed denial of service attacks as those attacks proliferate, observes Jeff Wilson, principal analyst for security at Infonetics Research.
Despite the recent increase in cyberattacks, 83 percent of enterprises are not fully prepared to handle them, according to a survey of 360 senior business leaders by the Economist Intelligence Unit on behalf of Arbor Networks.
Threats against mobile networks are increasing in number and sophistication, but the underlying network security architecture has not been updated to keep pace with those threats, warned Selim Aissi, vice president for global information security at Visa, during a panel discussion at the RSA Conference this week.
Enterprises continue to be the leading target for distributed denial of service attacks, with 127 reported in the third quarter of 2013, according to Akamai's quarterly State of the Internet Report.
Recent reports from security firms warn that advanced persistent threats are on the rise and attackers are morphing their tactics.
In our Internet-connected age, DDoS attacks are a perennial problem that regularly make it into the news. In an attempt to better understand this topic, we posed a number of questions to Dan Holden, director of security research for Arbor Networks.