DISTRIBUTED DENIAL-OF-SERVICE (DDoS) ATTACKS: AN ECONOMIC PERSPECTIVE

January 25, 2017

While network security experts disagree on when the first Distributed-Denial-of-Service (DDoS) attack occurred, it is generally conceded that the most visible series of attacks occurred in February of 2000 when Internet giants Yahoo, Amazon, eBay, E-trade and others were attacked intermittently over a period of several days. The Yankee Group estimated the total cumulative costs of these attacks at $1.2 Billion U.S. Dollars, and it was later discovered that the attacks were conducted by a 15-year old Canadian teenager using the alias “Mafiaboy”. The teenager had crafted the series of attacks using several publicly available hacker tools.

Spotlight

Dataprise

The Dataprise philosophy is that our customers should be focused on running their core businesses – and not their technology. That’s where we come in. Since 1995, Dataprise has helped more than 5,000 organizations across the US make best use of their business technology. With a staff that consists of over 300 certified network technical consultants and support staff, we are able to move at light speed to anticipate our customers' needs which means that we have all the expertise that you’ll ever need – all under one roof.

OTHER WHITEPAPERS
news image

A New Technology Stack

whitePaper | November 23, 2022

Over the last four decades, the information technology industry has grown from about $50 billion globally in 1980 to more than $4 trillion. During this time, the IT industry has experienced the transition from mainframe computing to minicomputers, to personal computing, to internet computing, and to handheld computing.

Read More
news image

Best Practices for Secure Access of Third Party APIs from Mobile Apps

whitePaper | September 28, 2022

Mobile apps typically communicate with several backend services over the Internet. In some cases those services may have been developed specifically for that mobile app, but in most cases the app will be dependent on services developed by a 3rd party. This whitepaper discusses how communication with those services can be properly secured, and how Approov’s new runtime secrets protection feature enables significantly enhanced security to be added with a minimum of development effort.

Read More
news image

Artificial Intelligence (AI) and the Future of Application Security Testing

whitePaper | April 25, 2023

Artificial Intelligence (AI) is changing our world. In the future, AI will be essential to cybersecurity and application security testing. Organizations require AI to secure assets that power their business. As cyber-attacks become more sophisticated and widespread and leverage AI, organizations will need to rely on AI-powered security solutions to protect their systems and data.

Read More
news image

The AI Behind Vectra AI

whitePaper | December 14, 2022

Data science is Vectra AI’s north star. We have always believed that data science and AI, if used properly, can transform our fight against cyberattacks and give an edge to defenders. However, not all AI is the same.

Read More
news image

What Businesses with AI in Production Can Teach Those Lagging Behind

whitePaper | August 25, 2022

Businesses are in different stages with their artificial intelligence (AI) technologies. Even today, after many years of evaluating AI, only one third of organizations have actually put AI into production (31%1 ). Organizations that started somewhat later are currently prototyping their AI solutions (20%). Companies that only recently came on board with AI are experimenting with AI technologies for their business cases (25%). And a relatively large portion (24%) have only just begun evaluating AI for their business cases.

Read More
news image

TOP FIVE WAYS TO PREPARE FOR YOUR NEXT OFFICE 365TENANT MIGRATION

whitePaper | July 31, 2020

With organizations around the world rapidly adopting Office 365, IT pros need to be prepared to perform efficient, effective tenant-to-tenant migrations. Whether you’re undergoing a merger or acquisition, or it’s time to clean up and consolidate your IT infrastructure to drive productivity and growth, a successful migration requires one thing above all else: a tight focus on your users’ needs. In the end, success is not measured by checking off pieces of data moved; it’s about ensuring that everyone remains productive during the project and after migration is complete.

Read More

Spotlight

Dataprise

The Dataprise philosophy is that our customers should be focused on running their core businesses – and not their technology. That’s where we come in. Since 1995, Dataprise has helped more than 5,000 organizations across the US make best use of their business technology. With a staff that consists of over 300 certified network technical consultants and support staff, we are able to move at light speed to anticipate our customers' needs which means that we have all the expertise that you’ll ever need – all under one roof.

Events