
Blog
Cybersecurity best practices and DDoS defence strategies
Featured blog posts
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Blog

South Africa less than ready for DDoS attacks
Without the right combination of people, processes and technology built upon the right infrastructure, the same old DDoS problem can cause a new pain to South Africa’s networks.
Show All
2019
2019
No items found.

Who knows you better than you know yourself? Your smartphone.
Believe it or not, chances are that your smartphone has been compromised and incorporated into botnets. Our research findings reveal that DDoS attacks originated from smart connected devices are on the rise.
Show All
2019
2019
No items found.

Smart City Security and the Importance of DDoS Protection
When IoT devices are introduced across smart cities, advanced security planning must be factored into the discussions. This is especially important if cities are to ward off attacks from botnets.
Show All
2019
2019
No items found.

DNSSEC Fuels New Wave of DNS Amplification
The continued adoption of DNSSEC as a solution DNS cache poisoning is now causing a new set of problems previously underestimated. Advanced protection is a must to safeguard DNS servers.
Show All
2019
2019
No items found.

What Is A DNS Attack And Why Are They Dangerous?
It is orchestrated by an attacker exploiting the vulnerabilities in a DNS. But what exactly is a DNS you might ask?Contact Nexusguard now.
Show All
2019
2019
DNS Protection
DNS Protection

VAPT on Static Website
Certified Pentester course was designed by our practitioners. Read through the article and get to learn from the experience of our practitioners.
Show All
2019
2019
No items found.

The Challenge of Data Sovereignty When Moving Cybersecurity to the Cloud
Data sovereignty should never prevent companies from using cloud-based security services, but instead, compel cloud vendors to be transparent.
Show All
2019
2019
No items found.

Nepal’s cybersecurity yet to catch up with exponential increase in smartphone internet access
With nearly half of its internet population relying on smartphones to access the internet, smartphone vulnerabilities lead to a greater attack surface and risk of DDoS attacks.
Show All
2019
2019
No items found.

The devastating effects of hitting mission-critical facilities
In developing nations where network infrastructure is less resilient, DDoS attacks on government websites can cause a more material impact to their economies.
Show All
2019
2019
No items found.

Sting with HTML5 Ping
HTML5 Ping is a common HTML5 attribute, which was found to have been turned into a DDoS attack tool.
Show All
2019
2019
No items found.
No Results found.
Please clear filter to show the list
Protect Your Infrastructure Today
Explore Nexusguard Edge Protection Solutions Today
