Carl W. Herberger
"The intent of the DDoS attacks was to disrupt operations or render the payment card brand and government websites unusable. By and large, it was successful," said Herberger. "In almost every instance, the Operation Payback attack overwhelmed the target websites, even if ‘business appropriate’ technology protection was in place. We need to evaluate new integrated technologies that can fight hactivism’s coordinated, high-volume, multi-layered attack patterns to minimize or nullify business disruption and its global impact."
Thursday, February 17, 2011 1 pm
- Cyber-retaliation: DDoS — a new tool for angry mobs;
- Use of social media networks for quick distribution of malicious tools;
- Previously unqualified attackers/profiles when no signature profiles are available;
- Bundled, multi-layered DDoS attack structure; and
- Unquantifiable scalability, which included any attacker from anywhere.
Herberger is a recognized Information Security expert with 20+ years experience in the Private and Public Sectors. He currently manages Radware’s security practice in the Americas, and has held prior high-level security posts with Evolve IP, Allied InfoSecurity, and Campbell Soup Company. He served as a U.S. Air Force officer and managed critical operational intelligence for computer network attack programs at the Pentagon.
About RSA® Conference
This press release may contain forward-looking statements that are subject to risks and uncertainties. Factors that could cause actual results to differ materially from these forward-looking statements include, but are not limited to, general business conditions in the Application Switching or Network Security industry, changes in demand for Application Switching or Network Security products, the timing and amount or cancellation of orders and other risks detailed from time to time in Radware’s filings with the Securities and Exchange Commission, including Radware’s Form 20-F.
Joyce Anne Shulman
+1 201 785 3209
SOURCE Radware Ltd