Ransom-based Attacks: Choosing the Right Mitigation Strategy
For years, organizations have been threatened by DDoS attacks on several fronts, ranging from volumetric attacks to application-level and DNS strikes. Now come ransom-based attacks.
In this interview with Trey Guinn - head of solution engineering at CloudFlare - he discusses the importance of matching your DDoS mitigation techniques to the type of DDoS attack.
Download this interview to hear from Guinn and explore:
- Which types of DDoS attacks most predominant today;
- How mitigation techniques must match the types of attacks;
- How to respond specifically to ransom-based attacks.