prolexic Podcast

Prolexic Technologies is the world’s largest, most trusted distributed denial of service (DDoS) protection and mitigation provider.

Listen on:

  • Podbean App

Episodes

Wednesday Feb 12, 2014

DDoS AttacksMulti-vector DDoS attack campaigns make DDoS mitigation more
difficult. Multiple attack vectors make it less likely the attack can be
blocked with automated devices. In addition, the DDoS mitigation team has to
track more details and to fight the attack on multiple fronts simultaneously.
In this podcast, Prolexic examines a Q4 2013 DDoS attack that involved a dozen
attack vectors, and explains how they fought back. (2:37)

Monday Feb 10, 2014

Prolexic DDos MitigationDDoS mitigation appliances alone are not enough to stop
today’s large, brute force DDoS attacks. Attackers can overwhelm and sidestep
static devices in several ways. In Prolexic’s experience, most tools available
today to fight against DDoS attacks are missing the most important part of the
solution – the experience of an expert security engineer. In this short
podcast, Prolexic explains why you need human security expertise in today’s
threat landscape (2:42).

Tuesday Jan 21, 2014

http://www.prolexic.com | In
a recent survey, online retailers shared their opinions on the Distributed
Denial of Service (DDoS) threat landscape, the likelihood of attacks and the
reliability of various DDoS protection and mitigation options. Get the survey
results in this short podcast (2:35)

Monday Jan 20, 2014


http://www.prolexic.com | SYN reflection attacks are one of
the more sophisticated distributed denial of service (DDoS) attack methods and
typically require some skill to execute. However, they have recently grown in
popularity as they have become available as a DDoS-as-a-Service application
from the criminal underground. Now even novices can launch a SYN reflection
attack. Learn more about this threat in this podcast. (2:45)

Monday Nov 25, 2013

www.prolexic.com | A growing trend in
cyber attacks are distributed reflection denial of service (DrDos) which
leverage IP-based devices such as printers and routers. By taking advantage of
the functionality of the SNMP, NTP and CHARGEN protocols, attackers can turn
mild-mannered network devices into malicious attacking bots. Learn more about
this threat in this podcast. (2:31)

Copyright 2013 . All rights reserved.

Podcast Powered By Podbean

Version: 20241125