Ransom-based Attacks: Choosing the Right Mitigation Strategy

Ransom-based Attacks: Choosing the Right Mitigation Strategy

For years, organizations have been threatened by DDoS attacks on several fronts, ranging from volumetric attacks to application-level and DNS strikes. Now come ransom-based attacks.

In this interview with Trey Guinn - head of solution engineering at CloudFlare - he discusses the importance of matching your DDoS mitigation techniques to the type of DDoS attack.

Download this interview to hear from Guinn and explore:

  • Which types of DDoS attacks most predominant today;
  • How mitigation techniques must match the types of attacks;
  • How to respond specifically to ransom-based attacks.



Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.