Search blog for

,

Top Incapsula Blog Posts in 2016

We spend a lot of time following internet security issues on our blog and this year has been one filled with historical events and many interesting developments.

We saw what you read, shared and liked. This post showcases the most popular posts culled over the past 12 months. It’s a great way to gain perspective on the ever-changing landscape of online security and assess your needs. Here for your reading pleasure are the top 10 posts from 2016. We’ve included two additional links that are worth a second peek as well.

Breaking Down Mirai: An IoT DDoS Botnet Analysis

The website of security expert Brian Krebs was hit with a huge distributed denial of service (DDoS) attack in September. When the source code of the malware (Mirai) was revealed, the Incapsula security team took a close look at it. Mirai means “future” in Japanese. But we’re doing our best to make sure the evil botnet has “no future” for our clients. Mirai ga nai.

What Weak Spots Could DDoS Strike to Impact the U.S. Election?

The sanctity of the election process is important. That’s why online security was on our minds during the recent U.S. presidential race. A DDoS attack could have disrupted the efforts of voters getting out to the polls on Nov. 8th.

Mirai Scanner: Are You an Unwitting Mirai Botnet Recruit?

Because of high-profile attacks on KrebsOnSecurity and Dyn, the Mirai botnet quickly become infamous. Because Mirai targets personal IoT devices, you could inadvertently become a victim of a DDoS attack. We advise everyone to configure and manage the security settings on your home devices. Take control of your “future” now.

Setting Up a GRE Tunnel for Incapsula IP Protection on an Ubuntu AWS Client

Ubuntu is the most popular operating system used in conjunction with Amazon Web Services. If you’re using AWS and Incapsula IP Protection, we step you through how to install a generic routing encapsulation tunnel (GRE). The Incapsula GRE offers an added layer of security to filter incoming traffic.

How to Secure Google Cloud Platform Deployments with the Imperva Incapsula Service

As data and applications move to Google Cloud Platform (GCP), so does the increase in web attacks. The GCP includes a number of basic security features. But for additional coverage, Incapsula provides a specialized solution for protection against web attacks, bots and application-layer DDoS attacks.

E-commerce Operator Jumia Selects Incapsula for Website Security and Infrastructure Protection

E-commerce is relatively new in Africa and the Jumia Group needed help securing its network of 120 websites spanning 22 countries throughout the continent. The Incapsula team worked closely with Jumia’s web ops team to secure its day-to-day operations and reduce maintenance costs.

2015 Bot Traffic Report: Humans Take Back the Web, Bad Bots Not Giving Any Ground

Our fourth annual traffic report looked at web bots (both good and bad) and uncovered an interesting trend. For the first time, humans were responsible for the majority of online traffic. To paraphrase the title of a popular Annie Lennox and Aretha Franklin song: “Humans Are Doin’ It for Themselves.”

Extended Stay America, Mobile Nations and Triton Digital Use Incapsula: Scalable, Resilient Cloud Security

Incapsula is built on a network called Behemoth. Behemoth sounds like it is. Big and bad. The network runs our cloud-based application delivery platform that boosts online security, DDoS mitigation, load balancing and failover services for numerous websites. We’re very proud of it.

Two-Factor Authentication: Why It’s Still Important

The traditional way to log into a website requires merely a user name and a password. This doesn’t provide the best security. A two-factor authentication process on the other hand requires a second form of validation adding a layer of security. This helps keep unwanted bots from overtaking your website.

31 Security Tips in 31 Days

We curated 31 security tips from our staff, readers and writers for each day in October for National Cyber Security Awareness Month. Here’s one tip we can all use: don’t use any device right out of the box. Make sure to change all default/generic passwords right away.

As a bonus we are highlighting two articles that are ever popular.

Ten Bots You Should Know About

Not all bots all evil. Most of them work silently and diligently to make your website run more efficiently. We compiled a list of the 10 most important good bots. Make sure your web ops team welcomes these helpful applications.

Why CMS Platforms Are Common Hacking Targets (and what to do about it)

The three most popular content management systems are WordPress, Joomla, and Drupal. Unfortunately, these three platforms are among the most popular targets for hackers. All CMS offer in-house security tools, but it’s always a good idea to be vigilant. Make sure you know what your options are when it comes to security.

Did you enjoy reading a post we didn’t mention? Please let us know which was your favorite post in 2016 in the comments below.