Leading information security consultant at R-Vision Evgeny Gulyaev

Master the art of fan database management together.
Post Reply
tanjimajuha20
Posts: 581
Joined: Thu Jan 02, 2025 7:16 am

Leading information security consultant at R-Vision Evgeny Gulyaev

Post by tanjimajuha20 »

Alexey Lukatsky, a business consultant on information security at Positive Technologies, agrees: “Fighting DDoS on a national scale is an important and necessary matter, since not all companies, especially small and medium-sized businesses, are able to purchase solutions to combat such attacks or enter into contracts for the provision of relevant services with specialized providers. Moreover, the current geopolitical situation is largely the reason for the growth of DDoS attacks, and saudi arabia cell phone number list who, if not the state, should solve this problem. However, it cannot be said that this system, after its introduction at the end of 2024, will finally solve this problem. The fact is that the existing approach implemented by TSPU solutions is based primarily on identifying and blocking IP addresses and their ranges from which malicious activity is carried out. At the same time, there are also applied DDoS attacks, to combat which more focused solutions are needed that use other methods of detecting and blocking attacks. Therefore, individual customers will also have a demand for more advanced DDoS protection than the state, represented by the Center for Monitoring and Control of the Public Communications Network, can offer."

believes that the sharp increase in the number of DDoS attacks recorded in Russia since February of this year against the backdrop of the current geopolitical situation has clearly demonstrated the need to create a centralized DDoS3 protection system at the state level. "This is necessary for rapid response, localization and mitigation of the consequences of attacks against Russian companies and government agencies. The construction of a centralized DDoS protection system can be implemented on the basis of the infrastructure of one or several suppliers in the telecommunications market that have communication channels with the highest capacity and the appropriate competence to promptly respond to incidents related to third-party traffic used in such DDoS attacks," he commented.
Post Reply