Carl Herberger outlines a few cyber security priorities the new administration must address for a highly functioning democracy and success for the nation. http://ow.ly/o3Uc307bS4c
"We live, essentially, in a world where freedoms are granted, but not protected." More from Carl Herberger in CXOUSA_Servosell: http://ow.ly/c0Rm307bRKG

|


Excited to share that we have been recognized by CIO Review as one of the 20 Most Promising DDoS Solution Providers in 2016! http://ow.ly/SQ74307bQVj
Where would consumers point fingers if their internet-connected devices are compromised and used as part of an IoT botnet? http://ow.ly/C77g3079ORa
While the Internet of Things brings forth many benefits to consumers, it also brings risk. http://ow.ly/JNut3077tRl
Carl Herberger explores some plausible cyber-attack profiles and scenarios that we're predicting for the upcoming year: http://ow.ly/7SPH3075hCm
For the first time ever, holiday shoppers are expected to spend an equal amount online and in-store. http://ow.ly/lZlS3073dQj
To continue growing and evolving the cloud space, a more clear standardization of solution benefits, services, and features must be put into place industry-wide. http://ow.ly/yYM6306Whgv
"If growth of attack surface, techniques and means continues into 2017, then the best years of security of our systems may be behind us." - Carl Herberger http://ow.ly/V3qf306WgZf
59% of executives surveyed have either hired or would hire an ex-hacker as a way to inject cybersecurity talent into their workforce. http://ow.ly/ZRUt306RxSM
The hardware and software have been virtualized, but the “humanware” is racing to catch up to support the capabilities of the virtual infrastructures. http://ow.ly/hUbi306Wa1i
#ThreatAlert: HTTP flood is a favorite of hackers when it comes to causing a business disruption, as they are much harder to block and are prevalent. http://ow.ly/5fAU306Wb5D
A DNS reflective attack is used in many distributed denial-of-service (DDoS) attacks to knock down an internet pipe. Here's how it works: http://ow.ly/5JmH306TYH2
Our ERT Researchers throughout the year are constantly reviewing and analyzing attacks to gain insight into trends and changes in the attack vector landscape. Here's what they found in 2016: http://ow.ly/ewvX306RtQL
Why did businesses wait so long to invest in cybersecurity? http://ow.ly/WXvi306FKvn































