JUL 29, 2014 5:03pm ET

Related Links

More Than 75 Percent of Mobile Apps Will Fail Basic Security Tests
September 16, 2014
How Much Do Data Breaches Cost? Two Studies Attempt a Tally
September 12, 2014
How This Small Bank Kicks Cybercriminals Off Its Network
September 9, 2014

Web Seminars

Why Data Virtualization Can Save the Data Warehouse
Available On Demand
Essential Guide to Using Data Virtualization for Big Data Analytics
September 24, 2014

DDoS Attacks Are Still Happening — and Getting Bigger

Print
Reprints
Email

Distributed denial of service attacks have grown larger in scale, more sophisticated and harder to detect, according to three large technology vendors that have recently published analyses of attacks.

Get access to this article and thousands more...

All Information Management articles are archived after 7 days. REGISTER NOW for unlimited access to all recently archived articles, as well as thousands of searchable stories. Registered Members also gain access to:

  • Full access to information-management.com including all searchable archived content
  • Exclusive E-Newsletters delivering the latest headlines to your inbox
  • Access to White Papers, Web Seminars, and Blog Discussions
  • Discounts to upcoming conferences & events
  • Uninterrupted access to all sponsored content, and MORE!

Already Registered?

Filed under:

Advertisement

Comments (1)
Saw this today, and it remains relevant. With broader width of cloud computing, hybrid solutions and wider data span and bandwidth comes higher number of potential vulnerabilities and wider landscape for DDOS attacks. It is a reality and unless an intuitive thwarting mechanism isn't deployed, they will continue to adapt to network protocols (since they are mostly static by their very nature of solutions) - especially in traditionally data intensive and repetitive services like govt., healthcare and banks. Incidentally these are also major handlers of sensitive data. It needs us to cut through the internet and network security threats more effectively to counter these challenges. More at http://goo.gl/ew2TsV
Posted by Eamon W | Thursday, August 14 2014 at 10:38PM ET
Add Your Comments:
You must be registered to post a comment.
Not Registered?
You must be registered to post a comment. Click here to register.
Already registered? Log in here
Please note you must now log in with your email address and password.
Twitter
Facebook
LinkedIn
Login  |  My Account  |  White Papers  |  Web Seminars  |  Events |  Newsletters |  eBooks
FOLLOW US
Please note you must now log in with your email address and password.