What is DDoS mitigation and how does it work?

September 17, 2020 | Ericka Chickowski
Ericka Chickowski

Ericka Chickowski

An award-winning freelance writer, Ericka Chickowski specializes in telling stories about the intersection of information technology and business innovation. Her perspectives on cybersecurity have appeared in numerous trade and consumer magazines, including Dark Reading, Entrepreneur, InformationWeek, and Security Boulevard.

September 17, 2020 | Ericka Chickowski

What is DDoS mitigation and how does it work?

This blog was written by a third party author. Distributed denial of service (DDoS) attacks are a favorite method for attackers to disrupt or debilitate firewalls, online services, and websites by overwhelming systems with malicious traffic or transaction requests. DDoS attackers accomplish this by coordinating an army of compromised machines, or 'bots', into a network of devices they control from…

August 25, 2020 | Ericka Chickowski

Security risk assessments explained

This blog was written by a third party author. What is a security risk assessment? A security risk assessment is a formal method for evaluating an organization's cybersecurity risk posture. Comprehensive security risk assessments take stock in business objectives, existing security controls, and the risk environment in which the business operates. When done well, the assessment identifies security gaps…

Get the latest security news in your inbox.

Subscribe via Email

August 10, 2020 | Ericka Chickowski

Cybersecurity risk management explained

This blog was written by a third party author What is cybersecurity risk management? Cybersecurity risk management is the practice of prioritizing cybersecurity defensive measures based on the potential adverse impact of the threats they're designed to address. Establishing a risk management approach to cybersecurity investment acknowledges that no organization can completely eliminate every system vulnerability or block every…

July 14, 2020 | Ericka Chickowski

DDoS attack prevention and protection explained

This blog was written by a third party author. Why DDoS prevention is paramount Distributed denial of Service (DDoS) attacks stand as some of the most disruptive and costly cyberattacks that organizations face on a regular basis. Cyber criminals use DDoS attacks to make websites and other online services unavailable for legitimate use. They do this by coordinating a flood…

July 8, 2020 | Ericka Chickowski

Types of DDoS attacks explained

This blog was written by a third party author and does not reflect the opinions of AT&T The general types of DDoS attacks Distributed denial of service (DDoS) is a broad class of cyberattack that disrupts online services and resources by overwhelming them with traffic. This renders the targeted online service unusable for the duration of the DDoS…

June 30, 2020 | Ericka Chickowski

Cybersecurity penetration testing explained: what is pen testing?

This blog was written by a third party author. What is penetration testing? Cybersecurity penetration testing is a method of checking for security weaknesses in software and systems by simulating real-world cyber-attacks. Also known colloquially as 'pen tests,' penetration tests probe beyond the scope of automated vulnerability scans. Pen tests find gaps in protection that can arise when unique combinations…

June 25, 2020 | Ericka Chickowski

SD-WAN security explained

This blog was written by a third party author and does not reflect the opinions of AT&T. What is SD-WAN? Software-defined wide area networking (SD-WAN) is a distributed networking approach that provides organizations a sustainable alternative to high latency hub-and-spoke network topologies. How SD-WAN supports network performance Legacy hub-and-spoke networks backhaul branch office traffic to a centralized data…

June 18, 2020 | Ericka Chickowski

Benefits of a security operations center (SOC)

This blog was written by an independent guest blogger. Why having a SOC is paramount A well-run security operations center (SOC) stands as the central nervous system of an effective cybersecurity program. SOCs serve as a hub of organization-wide detection and response capabilities for the people tasked with stopping cyber threats within their organization. While the everyday duties of the…