Blog

  • Web-Based Attacks Threaten Apps and Data

    Web-Based Attacks Threaten Apps and Data

    The wide variety of cyberattacks against websites, applications, and APIs exposed to the internet make security more complex than ever. Web-based attacks can affect the availability of sites and...

    Read Now
  • Iraq Protests Lead To Two-Day Blackout

    Iraq Protests Lead To Two-Day Blackout

    After a week of widespread protests against corruption and poor government services, the Iraqi government declared a state of emergency last week.  And as part of that measure, the government...

    Read Now
  • Iraq Protests Lead To Two-Day Blackout

    Iraq Protests Lead To Two-Day Blackout

    After a week of widespread protests against corruption and poor government services, the Iraqi government declared a state of emergency last week.  And as part of that measure, the government...

    Read Now
  • Making a Call for Better Telco Security

    Making a Call for Better Telco Security

    As phone and internet access have merged into one service, forming the pillar of just about every enterprise, telco security has come under attack. The telecommunications industry is rapidly...

    Read Now
  • Five Web Security Risks You Can Manage in the Cloud

    Five Web Security Risks You Can Manage in the Cloud

    Websites, applications, backend databases, and origin servers make up an organization’s web presence. An organization’s web presence is not always located behind the corporate firewall, so it is...

    Read Now
  • Last Month In Internet Intelligence: June 2018

    Last Month In Internet Intelligence: June 2018

    In June, we launched the Internet Intelligence microsite (home of this blog), featuring the new Internet Intelligence Map.  As the associated blog post noted, “This free site will help to...

    Read Now
  • Last Month In Internet Intelligence: June 2018

    Last Month In Internet Intelligence: June 2018

    In June, we launched the Internet Intelligence microsite (home of this blog), featuring the new Internet Intelligence Map.  As the associated blog post noted, “This free site will help to...

    Read Now
  • Shutting down the BGP Hijack Factory

    Shutting down the BGP Hijack Factory

    It started with a lengthy email to the NANOG mailing list on 25 June 2018: independent security researcher Ronald Guilmette detailed the suspicious routing activities of a company called Bitcanal,...

    Read Now
  • Shutting down the BGP Hijack Factory

    Shutting down the BGP Hijack Factory

    It started with a lengthy email to the NANOG mailing list on 25 June 2018: independent security researcher Ronald Guilmette detailed the suspicious routing activities of a company called Bitcanal,...

    Read Now
  • Bot Protection Must Scale to Meet Today’s Threats

    Bot Protection Must Scale to Meet Today’s Threats

    Bots are ubiquitous, so bot protection should be too. More than half of today’s internet traffic is not derived from human activity. It comes from bots. Many bots are harmless, but others...

    Read Now
  • Got Malicious Bots? There are Solutions

    Got Malicious Bots? There are Solutions

    Malicious bots are not a new problem. They have just taken different forms over the years. Most organizations and consumers don’t realize that more than 60% of the traffic on the internet is not...

    Read Now
  • Three Takeaways from O’Reilly Velocity

    Three Takeaways from O’Reilly Velocity

    Oracle Dyn had a busy week at the O’Reilly Velocity Conference. Highlights of our time at the show in San Jose, Calif. included the launch of the Oracle Internet Intelligence Map, the opportunity...

    Read Now
  • Why You Need AI for Security

    Why You Need AI for Security

    Enterprises will increasingly use machine learning and AI for security and internet traffic management, according to Kyle York, vice president of product strategy for Oracle Cloud Infrastructure. ...

    Read Now
  • How Dyn and the Cloud are Reinventing Oracle

    How Dyn and the Cloud are Reinventing Oracle

    As Oracle and its customers move to the cloud, Dyn has emerged as a key piece of the migration puzzle.  Oracle acquired Dyn in 2016 to provide internet performance, visibility, and traffic...

    Read Now
  • Edge Computing Adoption Depends on the Company

    Edge Computing Adoption Depends on the Company

    All types of businesses should start paying attention to the edge, but some are further along with edge computing adoption than others.  Cloud-native companies are leading the charge, as are large...

    Read Now
  • Need a Cloud DDoS Protection Provider? Ask These 8 Questions

    Need a Cloud DDoS Protection Provider? Ask These 8 Questions

    Organizations that thrive on constant internet availability must have a DDoS defense strategy in place, but choosing a cloud DDoS protection provider is not easy. The following eight questions...

    Read Now
  • Three AI and Machine Learning Cybersecurity Tips

    Three AI and Machine Learning Cybersecurity Tips

    Artificial intelligence and machine learning cybersecurity technologies hold the key to stopping today’s advanced threats. Enterprises are failing to keep up with the evolving threat landscape,...

    Read Now
  • Cybercriminals Take Aim at Cloud Infrastructure Security

    Cybercriminals Take Aim at Cloud Infrastructure Security

    Cybercriminals are known for hacking into company networks and stealing data from endpoint devices. But increasingly, they’re also going after the underlying infrastructure that supports cloud...

    Read Now
  • For Internet Network Security, DNS Visibility is a Must

    For Internet Network Security, DNS Visibility is a Must

    Internet network security is more challenging than ever, and many organizations don’t have the tools to identify and address potential problems. DDoS for hire, BGP hijacks, DNS cache poisoning...

    Read Now
  • Introducing the Internet Intelligence Map

    Introducing the Internet Intelligence Map

    Today, we are proud to announce a new website we’re calling the Internet Intelligence Map. This free site will help to democratize Internet analysis by exposing some of our internal capabilities...

    Read Now
  • loading
    Loading More...