NTP Reflection and DDoS
Let’s say a company runs a promotion for a free can of soup. And let’s say that 1000 of your friends decide to send the soup company your address instead of theirs. You would likely get 1000 cans of soup! Now consider that 10,000 people decided to use your address for their free soup… Unless […]
Is Your Wi-Fi Router a Chameleon?
Most of us have some kind of anti-virus and intrusion detection system on our home and business computers. (If you don’t, you should!) These systems work to prevent intrusions on our systems. We run them on workstations and servers and trust them to protect our networks against certain types of threats. But our embedded systems […]
How Much of Cloud Security is New and Different?
As far as cybersecurity technology goes, absolutely nothing is new or different about cloud security. Cloud security is based on precisely the same fundamental technology you should already be using in your in-house operation. The only difference is that you are turning over control, and thus visibility, of some of the operation to a cloud […]