spirent.com
Posts Tagged "Security testing"

The latest V2X OmniAir Plugfest exposed that the need for testing basic V2X requirements is still strong. Read how Spirent tools help to achieve cross-vendor interoperability, device readiness for certification, as well as conformance to the latest safety and security standards.

Read full post 0 Comments

Real-time communication is an absolute necessity in Automotive manufacturing. Goal is to equip one single network with TSN enabled components for time-critical data transmission in and between vehicles, and in all future industrial environments. Spirent supports different setups for TSN + OPC UA Smart Manufacturing testbeds for IA and Automotive

Read full post 0 Comments

Read about the challenges of M2M/IoT development and how you can make sure your IoT hardware and software solutions are compatible, flexible and future-proof.

Read full post 0 Comments

The history of Secure Sockets Layer (SSL) and its successor Transport Layer Security (TLS) have been marked by significant cryptographic breaks and implementation flaws with exploits wreaking havoc upon enterprises and the public.

Read full post 0 Comments

2017 has seen a marked increase in the number and size of DDoS attacks around the world.  DDoS attacks are getting stronger and more disruptive with every passing moment, and organizations need to be preemptively testing and be prepared in the event of such attacks. 

Read full post 0 Comments

In the real world, how do most people create a test case? In most instances, they open the tester GUI, configure the test, debug the test, run the test, print the report, and are done. The question when we drill deeper is “Is this the most effective way for us to be performing our testing?” Let’s drill down into the problems this technique creates for organizations. Generally, many test engineers are given a test set which may include a full DUT or specific test ports on a shared DUT. The configuration of specific attributes of these ports such as routing/IP information, firewall rules, ALCs typically do not change unless they are specifically being tested. In the classic model, the user keeps rebuilding attributes of the test over and over again potentially building the same test hundreds of times.

Read full post 0 Comments

When we’re testing for provisioning scale for a device under test candidate, what is the meaningful metric to measure? Traditional metrics such as bandwidth, connections per second, or open connections are narrow focused metrics that measure specific engineering attributes of the device. For example, open connections and connections per second will give you information about table scaling and bandwidth will give you information about forwarding efficiency but neither of these metrics will put it all together and directly measure how users perceive quality over time.

Read full post 0 Comments

Recently, the U.S. Department of Defense (DoD) launched “Hack the Pentagon”, its pilot bug bounty program. This first-ever federal government-initiated program is designed to identify and resolve security vulnerabilities. However progressive it is, it’s still not a replacement for traditional security testing, and secure coding practices.

Read full post 0 Comments

It’s almost daily that we hear about one company after another with a data security breach of some kind. As recently reported by The New York Times, the Korea Credit Bureau is just one of the latest victims—with credit card details stolen from almost half of all South Koreans and sold to marketing firms. Also reported, the original 30 million affected from the Target data theft is now estimated to be between 70 and 110 million people. InformationWeek is calling the recent distributed denial-of-service attack (DDos) on Cloudflare one of the largest DDoS attack ever recorded, eclipsing the Spamhaus attack of last year. And the list goes on and on…

Read full post 0 Comments

In our last blog “Preparing Yourself for a Malware Epidemic,” we discussed the various types of malware and how they spread. In this blog, we’ll discuss some questions that every network manager should ask when testing their own network for malware.

As technology improves, malware attacks are becoming more destructive and harder to detect, costing you valuable time and resources. This means you need to be more vigilant and more prepared for an attack than ever before.

Read full post 0 Comments

Malicious software, better known as “malware,” describes a broad category of hostile software that is used to disrupt computer operations, gather sensitive information, or gain access to private computer systems. In this three-part blog series, we’ll take you through the ins and outs of malware. We’ll cover some of the topics found within our in-depth white paper “How Strong is Your Malware Testing?” and give you more details about how you can better prepare for a malware attack.

Read full post 0 Comments

How do you test against security threats you don't know exist?  In a previous blog we looked at how testing with signatures can be used to reduce known security threats.  However, for unknown threats, an alternative such as fuzzing testing needs to be employed.  Fuzzing testing passes random data through network protocols, API calls, and file streams—virtually anywhere applications and devices receive inputs. One of the goals is to determine whether any of this random input can crash or hang an application, bring down a website or put a device in a compromised state.

Read full post 0 Comments

The first topic we will look at in the series of blogs on network security is Distributed Denial-of-Service (DDoS). As we’ve all seen, DDoS attacks come from a multitude of compromised systems (botnets) attacking a single website with a flood of incoming messages, thereby causing a denial of service for your users. In a severe case, a massive DDoS attack took the entire country of Myanmar offline in 2010.  Many industry pundits have stated that botnets represent the biggest threat to Internet security.

Read full post 0 Comments

It's sobering to look at network security headlines today.   One might come to the conclusion that little progress has been achieved in stopping security breaches.  The range of headlines runs the gamut from non-business-threatening attacks to politically driven attacks against some of the worlds largest companies.

At one end of the spectrum, a denial-of-service attack prevented voting at the recent Miss Hong Kong pageant...

At the other end of the spectrum, "hacktivists" made a bold political statement against the world's largest oil company...

Read full post 0 Comments

Enterprise networks are being attacked on multiple fronts—hacking, data breaches, and denial of service attacks—sometimes simultaneously. Are your IT departments adequately prepared to address these multi-dimension security challenges without impacting business productivity? To effectively stop attacks on the network, many IT departments increase their network security, sometimes at the cost of reducing access to legitimate traffic and end users. The key to successful data center...

Read full post 0 Comments
× Spirent.com uses cookies to enhance and streamline your experience. By continuing to browse our site, you are agreeing to the use of cookies.