Archive Search Articles

Combat Commodified Attacks with Managed Security Services

by: Lee Slaughter

Anyone with access to a computer can point a DDoS-for-hire push button tool anywhere they want for just a few bucks. The sophistication is low and the accessibility is high, meaning the frequency of these attacks is primed to increase.

When Things Attack, Turn to Cloud

by: Lori MacVittie

Cyber. Things. Security. DDoS. These are digital disruptions; the modern equivalent of enemies at the gate.

Are you defending apps, or protecting them?

by: Lori MacVittie

Technology tends to use a lot of words interchangeably, but in some cases, the difference is actually pretty profound.

Security in the Cloud: The Business Perimeter

by: Lori MacVittie

When Leonidas of the Spartans found himself faced with the prospect of defending Sparta against the totally much bigger and meaner Persian army, he specifically chose the narrow pass at Thermopylae to do so. In the Battle of Stirling Bridge,...

Block the Bad Guys Everywhere with F5 Silverline Threat Intelligence

by: Lori MacVittie

There’s an old myth associated with vampires that says they can only enter your home if invited. Obviously it’s in your best interests to not invite that vampire into your home. The problem is, of course, is how do you know that devilishl...

Do you want security “at your” or “as a” service?

by: Lori MacVittie

The world of cloud computing had, until recently, settled down into its primary pillars of SaaS, PaaS, and IaaS. But as cloud consumers continue to mature in their understanding and use of cloud we’re starting to see an increased interest in what...