Processing...
All posts tagged with: "Security"

Best Practices to Combat Route Leaks and Hijacks

Posted by on January 26, 2017

In past blogs, we’ve explored how you can alert for and diagnose BGP route leaks and hijacks. Route leaks and hijacks—routing events where illegitimate prefixes are wrongly propagated through the Internet—are notoriously difficult to troubleshoot and have the potential to bring down entire swaths of the Internet.… Read More »

Running Low Latency on Hi-Rez’s Online Gaming Network

Posted by on December 21, 2016

In this post from ThousandEyes Connect New York, we’ll summarize the presentation by Nabil Ismail, VP of Operations & Technology at Hi-Rez Studios. During his talk, Nabil described his team’s formidable task of ensuring that they continually provide a smooth, fast online experience to their 15+ million gamers across the globe.… Read More »

Three Types of DDoS Attacks

Posted by on November 15, 2016

Distributed Denial of Service (DDoS) attacks have been a popular topic of discussion in the past few months. We have seen a flurry of prominent DDoS attacks, such as the attacks on DNS root servers and the Dyn DNS outage, with widespread impact and the potential to disrupt communications worldwide.… Read More »

NANOG 68: Decoding Performance Data from Large-Scale Internet Outages

Posted by on November 7, 2016

At NANOG 68 in Dallas, TX on October 18, 2016, ThousandEyes CEO Mohit Lad presented on recent outages that had large-scale effects on Internet infrastructure and availability. During his talk, Mohit discussed three recent, impactful events: the June 2016 DNS root server DDoS, the May 2016 Sea-Me-We-4 cable cut and the April 2016 AWS route leak. … Read More »

Secure DNS Management: Best Practices

Posted by on June 20, 2016

The Domain Name System (DNS) is one of the most critical components of IT infrastructure. All online services depend on its proper operation. Without DNS, users are unable to access email, CRM applications, and other services, and if DNS is compromised, users may lose their data. DNS services can be secured with the right configuration and deployment of appropriate solutions.… Read More »