This site has commenting guidelines and comments are reviewed by moderators before they are fully published to the web site.
Subject of Your Post
Your Post
Protecting Performance from Traffic Spikes - Dark ...

Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comment
Protecting Performance from Traffic Spikes
johnhsawyer
50%
50%
johnhsawyer,
User Rank: Moderator
10/29/2014 | 12:51:57 PM
Re: Protecting Performance from Traffic Spikes
@tdudziak: What are some other examples of the "etc" in the previous slide?

I think you're referring to slide 15. In addition to the standard security products for mitigating the typical security attacks, I was thinking of things more on the infrastructure side that can aid both the website owner and the security team. Network infrastructure with logging and reporting with netflow. "Next gen firewall" that understand layer 7 and the applications, which can help greatly with profiling traffic and generating a baseline. Analytics through things like Google and Adobe Analytics that can show traffic profiles over time, help with optimizing slow pages, and identifying bottlenecks that may be with thrid-party hosts that you rely and not your own resources.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-4088
PUBLISHED: 2022-01-24
SQL injection vulnerability in Data Loss Protection (DLP) ePO extension 11.8.x prior to 11.8.100, 11.7.x prior to 11.7.101, and 11.6.401 allows a remote authenticated attacker to inject unfiltered SQL into the DLP part of the ePO database. This could lead to remote code execution on the ePO server ...
CVE-2021-40909
PUBLISHED: 2022-01-24
Cross site scripting (XSS) vulnerability in sourcecodester PHP CRUD without Refresh/Reload using Ajax and DataTables Tutorial v1 by oretnom23, allows remote attackers to execute arbitrary code via the first_name, last_name, and email parameters to /ajax_crud.
CVE-2021-41471
PUBLISHED: 2022-01-24
SQL injection vulnerability in Sourcecodester South Gate Inn Online Reservation System v1 by oretnom23, allows attackers to execute arbitrary SQL commands via the email and Password parameters.
CVE-2021-41472
PUBLISHED: 2022-01-24
SQL injection vulnerability in Sourcecodester Simple Membership System v1 by oretnom23, allows attackers to execute arbitrary SQL commands via the username and password parameters.
CVE-2021-40596
PUBLISHED: 2022-01-24
SQL injection vulnerability in Login.php in sourcecodester Online Learning System v2 by oretnom23, allows attackers to execute arbitrary SQL commands via the faculty_id parameter.
This site has commenting guidelines and comments are reviewed by moderators before they are fully published to the web site.
Subject of Your Post
Your Post