Uncovering DDoS Vulnerabilities with Simulation Testing: A Case Study

Register Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Adversaries conducting distributed denial of service (DDoS) continuously improve attack size and sophistication.  

Over the past years, hacktivists and other DDoS attackers have diversified their arsenal, using techniques ranging from HTTP request-intensive to IP packet-intensive and bit-intensive DDoS attacks. To make their attacks more efficient, they now traditionally use networks of devices, called botnets, programmed to send requests to the same website automatically.

The largest-ever DDoS attack occurred during the third quarter of 2023, with 201 million requests per second (rps) –almost eight times more significant than the previous record of 26 million rps, reported in 2022.

Taking an inside look at a DDoS simulation case study, this session will highlight how companies can prepare in advance, identify vulnerabilities, and mitigate DDoS attacks.

Tune in to learn:

  • Why DDoS attacks are so easy to launch today
  • How to gauge your exposure to DDoS threats
  • The impact of closing critical vulnerability gaps via simulation testing – a case study
  • Actionable steps for proactive DDoS protection 

Speakers

Photo of Ziv Gadot

Ziv Gadot

CEO, Red Button

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Red Button here: https://www.red-button.net/privacy-policy/. Please see Infosecurity Magazine’s privacy policy for more information.