Distributed Denial of Service (DDoS) attacks remain a top threat to network security, and have evolved in almost every way, to do what they do best: shut down access to your vital online services. Unlike intrusion and malware attacks, DDoS attackers have learned that they don’t need to attack only end-point servers to shut you down. They attack any IP address that routes to your network: unused IP addresses, ISP link subnets, or Firewall / Proxy / WiFi Gateway public IP addresses. CDN and DNS-based cloud mitigation cannot protect you from these attacks.
What is the impact to your business if your users cannot reach cloud services because your firewall is DDoSed? Sophisticated multi-vector and multi-layer DDoS attacks use direct and reflected packets where the spoofed, randomized source IP addresses are impossible to ACL. These attacks are increasingly common as Mirai-style code has morphed into many variants and has been commercialized by providers of “stresser” sites. Anyone can create large, anonymous attacks for a few dollars. DDoS is not an everyday occurrence for security teams, and they cannot be expected to understand the thousands of attack variants that target your network. To combat these attacks, you need a solution that dynamically and automatically protects a large attack surface.
Participants who attend this workshop will learn how to:
Date: 2023-11-30
Time: 9.00-13.00
Cost: Free
Language: Swedish
Date | Location | Duration | Time of Event | Reminder |
---|