About
Industry veteran bringing 20+ years of broad technology experience including routing and…
Articles by Gary
Activity
-
يعيد مشغّلو الاتصالات في الشرق الأوسط النظر في طرق بناء وتأمين شبكاتهم، إذ لم تعد الأتمتة المدعومة بالذكاء الاصطناعي خياراً إضافياً، بل أصبحت ضرورة…
يعيد مشغّلو الاتصالات في الشرق الأوسط النظر في طرق بناء وتأمين شبكاتهم، إذ لم تعد الأتمتة المدعومة بالذكاء الاصطناعي خياراً إضافياً، بل أصبحت ضرورة…
Shared by Gary Sockrider
-
Ransomware isn’t just locking systems anymore—it’s going after recovery. Attackers are expanding their use of encryption to target backups and…
Ransomware isn’t just locking systems anymore—it’s going after recovery. Attackers are expanding their use of encryption to target backups and…
Shared by Gary Sockrider
-
TopGolf with the San Jose team was a blast—even if some of our swings looked more like dance moves than golf techniques. 💃🏌️♂️NETSCOUT
TopGolf with the San Jose team was a blast—even if some of our swings looked more like dance moves than golf techniques. 💃🏌️♂️NETSCOUT
Liked by Gary Sockrider
Publications
-
Worldwide Infrastructure Security Report Vol. XIV
Arbor Networks
NETSCOUT's 14th Annual Worldwide Infrastructure Security Report (WISR) delivers insights from a global survey of network, security, and IT decision makers across enterprise and service provider organizations. Its focus is on the operational challenges they face daily from network-based threats and the strategies adopted to address and mitigate them.
-
Health care hacks: The difference between life and death
Healthcare Business Daily News
Cyberattacks continue to dominate our news cycle with the recent attacks like Reaper, WannaCry and NotPetya highlighting the harsh reality of today’s world: personal information is gold and cyberattacks are growing. According to NETSOUT Arbor’s 13th annual Worldwide Infrastructure Security Report (WISR), ransomware was cited as the top threat by enterprises in 2017. Business impacts due to attacks include reputation/brand damage and operational expense, in addition to revenue loss.
-
Worldwide Infrastructure Security Report Vol. XIII
NETSCOUT Arbor
NETSCOUT Arbor's 13th Annual Worldwide Infrastructure Security Report (WISR) offers direct insights from network and security professionals at the world's leading service provider, cloud/hosting and enterprise organizations. The report covers a wide range of topics, from DDoS attacks and major industry trends such as SDN/NFV and IPv6 adoption to key organizational issues such as incident response training, staffing and budgets. Its focus is on the operational challenges network operators face…
NETSCOUT Arbor's 13th Annual Worldwide Infrastructure Security Report (WISR) offers direct insights from network and security professionals at the world's leading service provider, cloud/hosting and enterprise organizations. The report covers a wide range of topics, from DDoS attacks and major industry trends such as SDN/NFV and IPv6 adoption to key organizational issues such as incident response training, staffing and budgets. Its focus is on the operational challenges network operators face daily from cyber threats and the strategies adopted to address and mitigate them.
-
How To Protect Customers From Massive DDoS Attacks In 2017
Channel Partners
The world has been on high alert following recent high-profile cyber-attacks that took down huge portions of the internet using the Mirai botnet. As a solutions provider, how are you helping customers prepare for a future that the data tells us is going to look different from today?
-
Healthcare security: Combating advanced threats
(IN)SECURE Magazine
From healthcare organizations to financial institutions, from universities to retail stores, every single business that collects customer data – whether it’s personal details, credit card information or real-time behavior – is a target for threat actors looking to steal that information.
-
Worldwide Infrastructure Security Report 2016
Arbor Networks
Patents
-
Method and system for controlling access to data communication applications
Issued US 20070168552
A method and apparatus for controlling access to data communication applications is disclosed. According to the method, the DNS names of the servers of the data communication applications are identified. The identified DNS names are used to determine the IP addresses of the servers. Furthermore, the identified IP addresses are used to control access to the data communication applications for the requests going to the servers of the data communication applications.
Other inventors -
Recommendations received
4 people have recommended Gary
Join now to viewMore activity by Gary
-
The data shows that hacktivist groups orchestrated hundreds of these coordinated #DDoS strikes each month, targeting the communications…
The data shows that hacktivist groups orchestrated hundreds of these coordinated #DDoS strikes each month, targeting the communications…
Shared by Gary Sockrider
-
These attacks have evolved beyond simple disruption tools into precision-guided weapons of geopolitical influence, capable of destabilizing critical…
These attacks have evolved beyond simple disruption tools into precision-guided weapons of geopolitical influence, capable of destabilizing critical…
Shared by Gary Sockrider
-
AI-enhanced automation, multi-vector attacks, and carpet-bombing techniques challenge traditional #DDoS defences.
AI-enhanced automation, multi-vector attacks, and carpet-bombing techniques challenge traditional #DDoS defences.
Shared by Gary Sockrider
-
Organizations need intelligence-driven, proven #DDoS defenses that can deal with the sophisticated attacks we see today
Organizations need intelligence-driven, proven #DDoS defenses that can deal with the sophisticated attacks we see today
Shared by Gary Sockrider
-
Attackers innovate faster than defenders adapt. Only intelligence-driven, adaptive protection stands a chance against today’s industrial-scale…
Attackers innovate faster than defenders adapt. Only intelligence-driven, adaptive protection stands a chance against today’s industrial-scale…
Shared by Gary Sockrider
-
AI-enhanced automation enables the scaling of #DDoS attacks, evading detection, and adapting to evolving network defences in real time.
AI-enhanced automation enables the scaling of #DDoS attacks, evading detection, and adapting to evolving network defences in real time.
Shared by Gary Sockrider
-
Hacktivist groups leverage more automation, shared infrastructure, evolving tactics, integration of #DDoS AI assistants, and the use of large…
Hacktivist groups leverage more automation, shared infrastructure, evolving tactics, integration of #DDoS AI assistants, and the use of large…
Shared by Gary Sockrider
-
We talk a lot about perimeter defense, but how often do we audit the basics like email hygiene and access controls?
We talk a lot about perimeter defense, but how often do we audit the basics like email hygiene and access controls?
Shared by Gary Sockrider
-
Cyber threats are evolving fast. In just six months, over 8 million DDoS attacks were launched—many linked to global unrest and hacktivist campaigns.…
Cyber threats are evolving fast. In just six months, over 8 million DDoS attacks were launched—many linked to global unrest and hacktivist campaigns.…
Shared by Gary Sockrider
-
If you think your DDoS protection is solid, carpet-bombing attacks might prove otherwise. This blog explains how these stealthy threats work—and…
If you think your DDoS protection is solid, carpet-bombing attacks might prove otherwise. This blog explains how these stealthy threats work—and…
Shared by Gary Sockrider
-
The shift to 5G SA is more complex than it seems. Even with 300+ providers offering 5G, most still rely on NSA. SA demands major changes to…
The shift to 5G SA is more complex than it seems. Even with 300+ providers offering 5G, most still rely on NSA. SA demands major changes to…
Shared by Gary Sockrider
-
What makes Win-DDoS significant is that it has high bandwidth and does not require an attacker to purchase dedicated infrastructure. Nor does it…
What makes Win-DDoS significant is that it has high bandwidth and does not require an attacker to purchase dedicated infrastructure. Nor does it…
Shared by Gary Sockrider
-
Network-based retrospective analysis isn’t just a nice-to-have; it’s the foundation for decisive, defensible security operations.
Network-based retrospective analysis isn’t just a nice-to-have; it’s the foundation for decisive, defensible security operations.
Shared by Gary Sockrider
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content