Types of DDoS attacks explained

July 8, 2020 | Ericka Chickowski
Ericka Chickowski

Ericka Chickowski

An award-winning freelance writer, Ericka Chickowski specializes in telling stories about the intersection of information technology and business innovation. Her perspectives on cybersecurity have appeared in numerous trade and consumer magazines, including Dark Reading, Entrepreneur, InformationWeek, and Security Boulevard.

July 8, 2020 | Ericka Chickowski

Types of DDoS attacks explained

This blog was written by a third party author and does not reflect the opinions of AT&T The general types of DDoS attacks Distributed denial of service (DDoS) is a broad class of cyberattack that disrupts online services and resources by overwhelming them with traffic. This renders the targeted online service unusable for the duration of the DDoS…

June 30, 2020 | Ericka Chickowski

Cybersecurity penetration testing explained

This blog was written by a third party author. What is penetration testing? Cybersecurity penetration testing is a method of checking for security weaknesses in software and systems by simulating real-world cyber-attacks. Also known colloquially as 'pen tests,' penetration tests probe beyond the scope of automated vulnerability scans. Pen tests find gaps in protection that can arise when unique combinations…

Get the latest security news in your inbox.

Subscribe via Email

June 25, 2020 | Ericka Chickowski

SD-WAN security explained

This blog was written by a third party author and does not reflect the opinions of AT&T. What is SD-WAN? Software-defined wide area networking (SD-WAN) is a distributed networking approach that provides organizations a sustainable alternative to high latency hub-and-spoke network topologies. How SD-WAN supports network performance Legacy hub-and-spoke networks backhaul branch office traffic to a centralized data…

June 18, 2020 | Ericka Chickowski

Benefits of a security operations center (SOC)

This blog was written by an independent guest blogger. Why having a SOC is paramount A well-run security operations center (SOC) stands as the central nervous system of an effective cybersecurity program. SOCs serve as a hub of organization-wide detection and response capabilities for the people tasked with stopping cyber threats within their organization. While the everyday duties of the…