Operations | Monitoring | ITSM | DevOps | Cloud


5 Web Security Tips For Small Businesses

Small businesses often overlook the importance of web security, but it is an essential component of any successful online presence. Without proper web security measures, your website and business can be vulnerable to various cyber threats, from hackers to spammers. To protect your business and customers, here are five essential tips on improving your website's security.

Shorten Recovery from Cyberattack with Cove's Standby Image

With a new standby image feature, N-able’s Cove Data Protection adds speed to the security, savings, and convenience of its cloud-first solution. You now have the ability to keep a local copy of your data on standby, shortening your time to recovery in the event of a cyberattack.

How Federal Buildings Are Converging Their Cyber And Physical Technologies For Futureproof Security

Since 2020, cybersecurity attacks have been considered among the top 5 risks to business health and are now common in businesses in both public and private sectors. Want to know how federal buildings are tackling the modern security landscape? Keep reading as we discuss how federal buildings are converging their cyber and physical technologies for futureproof security and how you can equip your business against future threats.

Protecting Your VoIP Infrastructure From DDoS Attacks

Distributed denial of service (DDoS) attacks are an ongoing issue for communications service providers, putting critical systems at risk, undercutting service level agreements, and bringing unwanted headlines. In the first half of 2022 6 million of these attacks were reported. Some metrics of DDoS attacks in 1H2022 compared to 2H2021.


How BGP propagation affects DDoS mitigation

We often think of DDoS attacks as volumetric malicious traffic targeted against organizations that effectively take a service offline. Most frequently detected by anomalous behavior found in NetFlow, sFlow, IPFIX, and BGP data, what may not be well understood is how the DDoS mitigation works and how it’s possible to visualize the effectiveness of the mitigation during and after an attack.

How BGP propagation affects DDoS mitigation

Doug Madory, Kentik director of internet analysis, and Phil Gervasi, director of tech evangelism, discuss the nuance of coordinating the mitigation of a DDoS attack and how we can use Kentik to see the propagation of BGP announcements on the public internet before, during, and after the DDoS attack mitigation.

3 Common Misconceptions about Executive Order 14028: Improving the Nation's Cybersecurity

The United States is the #1 target for cybersecurity attacks in the world. 38% of targeted cybersecurity attacks so far in 2022 were aimed at the United States data and systems. That’s alarming. And we see it in the news almost every day. Solarwinds, Colonial Pipeline, The Pulse Secure VPN zero-day… There’s an increasing number of threats and attacks, to the tune of 15.1% year over year.


Mind the Overspray - Password Spraying Remains a Major Threat

If you’re wondering if that classic car you’ve been scoping out on Bring a Trailer or eBay Motors is as authentic as posited by the seller – specifically re: the common claims of “original paint” or “high quality respray” – you’re going to want to take a closer look around the edges. This is because a talented painter can make a second or 30th-hand vehicle look pretty snazzy with a well-affected, if not super high-quality, repaint.

A NetOps Guide to DDoS Defense

Join Kentik and Cloudflare as we discuss and analyze the latest in DDoS attack trends. (We’re seeing some really interesting patterns in our data!) Back by popular demand: Doug Madory, Kentik’s Director of Internet Research, will walk through how BGP monitoring can determine if DDoS mitigations are actually effective. What you’ll learn.