247 results
Hands on Keyboard
/ Brad Christian

Benefits of Hybrid DDoS Protection

The distributed denial-of-service (DDoS) threat landscape is continuously evolving, with threat actors employing new attack vectors, approaches, and dynamically changing attacks to...

  • DDoS
Digital Aftershocks Collateral Damage DDoS
/ Gary Sockrider

Digital Aftershocks: Collateral Damage from DDoS Attacks

The NETSCOUT DDoS Threat Intelligence Report presents a succinct and research-driven analysis of the dynamic distributed denial-of-service (DDoS) attack and defense landscape...

  • DDoS
Person is hoodie with hands raised to sky
/ Michael Wetherbee

25 Years of Arbor (Networks) Innovation & DDoS Protection

In 2000, backed by DARPA, Cisco, and Intel, and based on research from a professor (Farnam Jahanian) and one of his graduate students (G. Robert Malan) from the University of...

  • DDoS
3 people sitting on sofa watching World Cup
/ Christian Syrbe

2026 World Cup: Endurance test for the next era of mobile networks

The massive scale of the tournament, which includes 16 stadiums and 104 matches, will push the power of mobile networks to the limit. Global sporting events have always driven...

  • AIOps
  • DDoS
  • Service Provider
DDoS Branding Image
/ Michael Wetherbee

In the Fight Against DDoS, NETSCOUT Emerges as a Top Contender in the Q3 2025 SPARK Matrix

In the ever-evolving world of cybersecurity, distributed denial-of-service (DDoS) attacks continue to grow in frequency and sophistication. For organizations across every sector...

  • DDoS
  • Service Provider
Business Benefits of Dedicated DDoS Mitigation
/ Brad Christian

The Business Benefits of Dedicated DDoS Mitigation

As the distributed denial-of-service (DDoS) threat landscape continues to evolve, so must defenses to maintain availability. DDoS attacks are a powerful tool in a cyberadversary’s...

  • DDoS
  • Service Provider
Person in hoodie looking at monitor
/ Andrew Green

Smarter Defense Against Carpet-Bombing Attacks

As cyberthreats evolve, so must our defenses. One of the most effective forms of modern distributed denial-of-service (DDoS) attacks is carpet bombing—a technique that spreads low...

  • DDoS
  • Service Provider
Top 9 Challenges Associated with DDoS Mitigation
/ Brad Christian

Top 9 Challenges Associated with DDoS Mitigation Efforts

Cyber adversaries are getting more sophisticated. With powerful malware, ransomware, and other cyberattacks continually getting more evasive and malicious, cybersecurity teams need...

  • DDoS
DDoS Attack images that looks like a cloud with a hand holding chalk
/ Andrew Green

Defending Against DDoS Attacks with Source-Based Mitigations

In the realm of cybersecurity, distributed denial-of-service (DDoS) attacks represent a significant threat to the stability and availability of online services. Traditional...

  • DDoS
  • Service Provider
Woman at a sitting at desk looking at computer monitor
/ Brad Christian

NETSCOUT’s Arbor DDoS Protection Earns Four G2 Badges for Summer 2025

We are proud to announce that NETSCOUT Arbor Threat Mitigation System (TMS) has received four badges in G2’s Summer 2025 cycle. These badges include Momentum Leader for DDoS...

  • DDoS
  • Service Provider
Gentlemen sitting behind monitors in a NOC or SOC
/ Andrew Green

The Importance of Source Misuse Detection for Service Providers

In today’s interconnected world, the security of internet networks is paramount. Service providers play a crucial role in maintaining the integrity and safety of the internet. One...

  • DDoS
  • Service Provider