<img alt="" src="https://secure.leadforensics.com/89462.png" style="display:none;">

Nexusguard Blog

Cybersecurity best practices and DDoS defence strategies

Latest Stories

Featured Stories

Cybercrime attacks and co...

Cybersecurity is a top concern for businesses large and small as cyber criminals’ ever-evo...

Protecting Against Applic...

Nexusguard’s Application Protection (AP) platform enforces three core mitigation engines, ...

CSPs need to adopt smarte...

Since 2020, Nexusguard Research has recorded over 4 million DDoS attacks, with Communicati...

Critical Remote Code Exec...

About the vulnerability Classified by US National Institute of Standards and Technologies ...

Preventing Slow HTTP Atta...

What is a slow attack?   As with the majority of DDoS attacks, the intention is to overwhe...

Why Cybersecurity needs t...

As organizations shift more of their operations online, cybercrime is happy to follow suit...

Safeguarding Telecommunic...

2021 has seen the telecommunications industry go through a particularly intense period of ...

Cybersecurity challenges ...

Since remote working became the new norm, Internet connectivity has not only become an ind...

Enabling RPKI for a Safer...

As we depend on the Internet more and more to manage our lives, securing internet routing ...

Making the switch from MS...

As COVID-19 has opened the door for perpetrators to leverage the fears of people to serve ...

OpenSSL fixes two high-se...

In March 2021, cybersecurity researchers disclosed two high-severity vulnerabilities that ...

How to detect and mitigat...

Nexusguard Research identified a new breed of stealthy DDoS attacks known as Bit-and-Piece...

COVID-19 pandemic causing...

In March and April, we recorded the most significant increase in DDoS attacks ever. Compar...

South Africa less than re...

As South Africa is the most connected country in Africa, South African organizations must ...

VAPT on Static Website

Nexusguard Certified Pentester (NCP) course was designed by Nexusguard practitioners who h...

The Challenge of Data Sov...

The “cloudification” trend goes on and digital transformation is in full swing, and moving...

Nepal’s cybersecurity yet...

Nepal is a country of unity in diversity blessed with Himalayan beauty. But the rampancy o...

Recent takedown of DDoS-f...

 Last year, the FBI cracked down on the world’s 15 biggest DDoS-for-hire websites, known a...

Amplified DDoS Attack Imp...

Thanks to the fast growth of cloud computing, enterprises and even governmental department...

What Can We Learn from th...

One of the few upsides of the most recent DDoS attacks is that every attack is a learning ...

Lorem Ipsum is a simple dummy text used as a dummy text contents. Lorem ipsum will be replaced. Lorem Ipsum is a simple dummy text used as a dummy text contents. Lorem ipsum will be replaced.Lorem Ipsum is a simple dummy text used as a dummy text contents. Lorem ipsum will be replaced.