Nexusguard Blog

Cybersecurity best practices and DDoS defence strategies

Featured Stories

Nexusguard Extended Cloud...

As introduced in our Network Protection Blog post, Nexusguard’s proprietary Bastions servi...

Nexusguard Edge Protectio...

A combination of on-premise and cloud protection is now a very typical offering. On-premis...

Nexusguard adds Network P...

Business relies on connectivity from Communications Service Providers (CSPs) to continue d...

CVE-2022-26134: Zero-Day ...

About the Vulnerability   On June 2, Volexity claimed that they had discovered unusual beh...

Maximizing Network Availa...

GRE (Generic Routing Encapsulation) tunneling, a means through which clean traffic is deli...

Cybercrime attacks and co...

Cybersecurity is a top concern for businesses large and small as cyber criminals’ ever-evo...

Protecting Against Applic...

Nexusguard’s Application Protection (AP) platform enforces three core mitigation engines, ...

Enhancing Nexusguard Clou...

With Border Gateway Protocol (BGP), transit network providers edit access lists in order t...

Safeguarding Customer Ass...

Customers who own or manage an Autonomous System (AS) cloud enjoy the benefit from using N...

Automatic filtering via N...

What is SmartFilter?   FlexFilter is a powerful mitigation tool within Netshield that allo...

CSPs need to adopt smarte...

Since 2020, Nexusguard Research has recorded over 4 million DDoS attacks, with Communicati...

Critical Remote Code Exec...

About the vulnerability Classified by US National Institute of Standards and Technologies ...

Preventing Slow HTTP Atta...

What is a slow attack?   As with the majority of DDoS attacks, the intention is to overwhe...

A Managed DDoS Service ma...

If you’re one of the few organizations or website owners that don’t know first-hand how se...

Attackers continue to der...

Ever since their discovery in July 2018, bit-and-piece attacks have gone from strength to ...

Defending Against RangeAm...

What is a RangeAmp attack? In early 2020, a team of Chinese researchers found a new way to...

Why Cybersecurity needs t...

As organizations shift more of their operations online, cybercrime is happy to follow suit...

Safeguarding Telecommunic...

2021 has seen the telecommunications industry go through a particularly intense period of ...

MSP Growth Trends for 202...

The proliferation of cloud technology, sophisticated cyber threats, shortage of specialize...

Cybersecurity challenges ...

Since remote working became the new norm, Internet connectivity has not only become an ind...

Lorem Ipsum is a simple dummy text used as a dummy text contents. Lorem ipsum will be replaced. Lorem Ipsum is a simple dummy text used as a dummy text contents. Lorem ipsum will be replaced.Lorem Ipsum is a simple dummy text used as a dummy text contents. Lorem ipsum will be replaced.