On May 25th, 2018, the General Data Protection Regulation (GDPR) becomes enforceable under law in the European Union (EU). It fundamentally changes how businesses (and the public sector) must handle information relating to their customers, giving greater protection to individuals and harmonising the laws for data-handling across the EU.
Automated. Adaptive. Simplified. Isn’t that what a cybersecurity solution should be? We know that the number one priority for security teams today is detecting and stopping advanced attacks before they cause major damage. Bad actors are operating with increased organizational efficiency and a seemingly bottomless pit of financial backing, not to mention they are constantly turning up the level of technological innovation they use to carry out their exploits.
Software subscription and technical support procurement processes can be incredibly challenging for enterprises. Identifying specific software and services needed, projecting the number and types of licenses needed, maintaining inventory of services procured, including potential service expiration dates, and evaluating the impact of expired licenses on business continuity all contribute to the complex procurement process. On top of that, security services introduce a new set of compliance and risk considerations if enterprises are not able to scale their security.
In the late February 2018 enormously high-volume DDoS attack was observed. It was UDP based memcached service reflection-and-amplification attack, reported as 1.4Tbpos strength.
The 1.4Tbps it is more than entire network capacity of many SP. The big SP of the world has network with higher capacity, but even for them – why to waste 10-20-30% of their resources to carry malicious traffic? So – DROP IT! And do this as early as possible.
Former US President, Ronald Reagan frequently used the Russian proverb “Trust, but verify”. This adage is also frequently used in the blockchain community. The idea is that some things are important enough that they must be verified.