<img alt="" src="https://secure.leadforensics.com/89462.png" style="display:none;">

Nexusguard Blog

Cybersecurity best practices and DDoS defence strategies

Latest Stories

Featured Stories

Hardening Web Application...

As the world becomes increasingly interconnected, online services such as social media and...

Validation of HTTP/S Requ...

Cross-site Request Forgery, aka. CSRF, Sea Surf, or XSRF, is an attack whereby cybercrimin...

Could “QUIC” turn into th...

Today, we use the Internet for so many different activities that it has become a necessity...

Nexusguard’s True-Hybrid ...

When it comes to implementing an effective DDoS defence, the dilemma facing Communications...

Smart Mode: DDoS Attack D...

Given the sophistication and complexity of DDoS attacks nowadays, traditional threshold-ba...

The Best of Both Worlds: ...

To safeguard their businesses from the growing diversity of DDoS attacks, organizations ha...

Could “Bypass Attacks” be...

In the first six months of 2020, rather than the use of traditional tactics exploited by t...

Reaping the Benefits of D...

In this day and age where DDoS attacks occur perpetually and abruptly, combining automatio...

How to detect and mitigat...

Nexusguard Research identified a new breed of stealthy DDoS attacks known as Bit-and-Piece...

COVID-19 pandemic causing...

In March and April, we recorded the most significant increase in DDoS attacks ever. Compar...

How Vietnam networks unwi...

While Vietnam’s internet penetration continues to grow with demand for faster connectivity...

MX7000: “Cloud-in-a-Box” ...

On top of a comprehensive suite of cloud-based DDoS mitigation solutions, Nexusguard has r...

DDoS Protection Vital for...

From popular multiplayer games to esports tournaments, the online/mobile gaming sector has...

Communications Service Pr...

Communications service providers (CSPs) are suffering from an extremely stealthy network-l...

Mitigating TCP SYN floods

On the Nexusguard platform, you can configure protection from TCP SYN flood attacks. The m...

Single targets, multiple ...

While the ongoing implementation of DNSSEC (Domain Name System Security Extensions) contin...

Ready for Holidays? Web A...

Happy New Year! December is one of the traditional shopping seasons. With the popularity o...

Up your game

Faced with more intense competitions and evolving cyber threats, local and regional commun...

South Africa less than re...

As South Africa is the most connected country in Africa, South African organizations must ...

Who knows you better than...

Now more than ever your smartphone has replaced the PC as the most important smart connect...

Lorem Ipsum is a simple dummy text used as a dummy text contents. Lorem ipsum will be replaced. Lorem Ipsum is a simple dummy text used as a dummy text contents. Lorem ipsum will be replaced.Lorem Ipsum is a simple dummy text used as a dummy text contents. Lorem ipsum will be replaced.