Nexusguard Blog

Cybersecurity best practices and DDoS defence strategies

Latest Stories

Featured Stories

Reaping the Benefits of D...

In this day and age where DDoS attacks occur perpetually and abruptly, combining automatio...

How to detect and mitigat...

Nexusguard Research identified a new breed of stealthy DDoS attacks known as Bit-and-Piece...

COVID-19 pandemic causing...

In March and April, we recorded the most significant increase in DDoS attacks ever. Compar...

How Vietnam networks unwi...

While Vietnam’s internet penetration continues to grow with demand for faster connectivity...

MX7000: “Cloud-in-a-Box” ...

On top of a comprehensive suite of cloud-based DDoS mitigation solutions, Nexusguard has r...

DDoS Protection Vital for...

From popular multiplayer games to esports tournaments, the online/mobile gaming sector has...

Communications Service Pr...

Communications service providers (CSPs) are suffering from an extremely stealthy network-l...

Mitigating TCP SYN floods

On the Nexusguard platform, you can configure protection from TCP SYN flood attacks. The m...

Single targets, multiple ...

While the ongoing implementation of DNSSEC (Domain Name System Security Extensions) contin...

Ready for Holidays? Web A...

Happy New Year! December is one of the traditional shopping seasons. With the popularity o...

Up your game

Faced with more intense competitions and evolving cyber threats, local and regional commun...

South Africa less than re...

As South Africa is the most connected country in Africa, South African organizations must ...

Who knows you better than...

Now more than ever your smartphone has replaced the PC as the most important smart connect...

Smart City Security and t...

The Internet of Things (IoT) has created new opportunities to address economic, social, an...

DNSSEC Fuels New Wave of ...

According to Nexusguard Research, DNS amplification attacks (8,382 counts) contributed to ...

What Is A DNS Attack And ...

What Is a DNS Attack? It is orchestrated by an attacker exploiting the vulnerabilities in ...

VAPT on Static Website

Nexusguard Certified Pentester (NCP) course was designed by Nexusguard practitioners who h...

The Challenge of Data Sov...

The “cloudification” trend goes on and digital transformation is in full swing, and moving...

Nepal’s cybersecurity yet...

Nepal is a country of unity in diversity blessed with Himalayan beauty. But the rampancy o...

The devastating effects o...

While timing is of essence amid evolving political events, hitting the right targets can m...

Lorem Ipsum is a simple dummy text used as a dummy text contents. Lorem ipsum will be replaced. Lorem Ipsum is a simple dummy text used as a dummy text contents. Lorem ipsum will be replaced.Lorem Ipsum is a simple dummy text used as a dummy text contents. Lorem ipsum will be replaced.