This page is fully or partially automatically translated.

Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Forums it-sa Expo Knowledge Forum A

The Rise of DDoS: Why Multivector Attacks Require Holistic Protection

Holistic DDoS protection: from attack vectors, network layers and perceived security in an escalated threat landscape.

calendar_today Tue, 25.10.2022, 11:15 - 11:30

event_available On site

Action Video

south_east

Action description

south_east

Themes

Cloud Security Managed Security Services / Hosting Websecurity / VPN

Event

This action is part of the event Forums it-sa Expo

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

 

Protection against distributed denial of service (DDoS) attacks is a standard feature in most professional hosting packages today. Nevertheless, severe web service outages occur every day as a result of DDoS attacks. But how does this dichotomy come about?
The reason is the trend for cybercriminals to distribute their attacks in an increasingly complex manner across different network layers. Even when organizations have valid network and infrastructure layer protections in place, their web applications remain vulnerable if no dedicated application layer protection is implemented.
Even on-premises protection solutions quickly reach their limit in the face of persistent attacks. Since the limits of cyber defense are defined here by the company's own hardware, scaling is only possible to a limited extent and is also cost-intensive. Reflection attacks enable cybercriminals to break through these limits with little effort. To do this, the attackers abuse the properties of network technologies such as DNS, NTP or TFTP to multiply the impact of their attacks.
In his presentation, Myra security expert Thomas Wagner goes into detail about the different DDoS attack methods and explains what companies need to consider for holistic protection of digital business processes.

... read more

Downloads

Language: German

Questions and Answers: No

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.