Cloud Attack Vectors and Counter Measures

October 5, 2018 Published in: Security Author: Vedran Bozicevic

Cloud computing technology provides organizations with a shared pool of computing resources over the internet, with low costs and guaranteed availability. While using cloud technology offers many advantages compared to on-prem models (scalability, control, cost reduction etc.), it’s important to realize that cloud environments are vulnerable to both inside and outside attacks. To protect the […]

Read More

5 Website Security Myths to Avoid

September 14, 2018 Published in: Security Author: Vedran Bozicevic

website security myths

The evolution of Internet has changed the way we live. Everything has become digitized – from our work, banking, personal communication, grocery shopping, and even our homes. This omnipresent digitization offers a myriad of opportunities for malicious actors to steal data for personal profit, or inflict damage in other ways by subverting the technology to […]

Read More

Cloud WAF: Overview and Benefits

August 2, 2018 Published in: Security Author: Vedran Bozicevic

cloud waf

Enterprises face daily cyber-threats which can cause revenue loss and damage to their reputation. To protect themselves against malicious actors, they employ various cyber-security measures, one of which is web application firewall (WAF). The area of Web Application security is a growing concern for enterprise organizations. Half of all attacks are directed at web applications […]

Read More

Website Security Basics

July 26, 2018 Published in: Security Author: Vedran Bozicevic

website security

Websites present a lucrative opportunity for hackers. Business websites which deal with money and sensitive information are especially at risk of cyber-attacks. Malicious actors can use a myriad of attack options to steal sensitive corporate data, trick end users into revealing personal information, or simply temporary disable a website. Even a small-scale attack which does […]

Read More

Is Data Safe in the Cloud?

June 28, 2018 Published in: Cloud,Security Author: Vedran Bozicevic

data safe cloud

Cloud storage enables companies to store their data in third-party data centers through a cloud provider. Organizations are rapidly adopting the cloud, but there’s a concern: is data safe in the cloud? The issues regarding cloud security are somewhat complex, but they fall into two broad categories: Security issues faced by cloud providers (organizations providing […]

Read More

Cloud Security Challenges

June 14, 2018 Published in: Cloud,Security Author: Vedran Bozicevic

cloud security

Cloud computing opens up a myriad of opportunities for businesses, but it also presents some unique security challenges to address. In this article we’ll take a look at cloud security challenges and how companies can overcome them efficiently. Moving your business to the cloud offers a range of benefits for enterprises, both large and small […]

Read More

DDos Quick Start Guide

April 19, 2018 Published in: Security Author: Vedran Bozicevic

In this guide we will examine the most common types of DDoS attacks, how they are performed and how they can be prevented. Denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a […]

Read More

2018 Bad Bot Report: The Year Bad Bots Went Mainstream

April 11, 2018 Published in: Security Author: Luka Labrovic

The 2018 Bad Bot Report investigates bad bot landscape and ways in which daily attacks impact websites and businesses. It’s based on 2017 data collected from GlobalDots’ global network, and includes hundreds of billions of bad bot requests, anonymized over thousands of domains. Bad bots interact with applications in the same way a legitimate user […]

Read More

Memcached Servers DDoS Attacks – The Complete Analysis

March 19, 2018 Published in: Internet,Security Author: Luka Labrovic

There’s been a lot going on recently in the DDoS mitigation field with two of the biggest DDoS (1.3 Tbps attack and 1.7 Tbps attack) attacks that ever happened all happening at the same time – with only four days apart from each other. Previously the Mirai botnet and the exploitation of IoT devices has […]

Read More

New Threat on the Rise – Denial of Inventory Attack

March 8, 2018 Published in: Analytics,eCommerce,Security Author: Luka Labrovic

OWASP (Open Web Application Security Project), a well known online community that produces freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security released their first guide called Automated Threat Handbook in late 2015 which purpose is to show all documented threats related to attacks accomplished by leveraging an automated tool, […]

Read More

Our Story


GlobalDots helps companies to evaluate, purchase, and integrate cloud services by acting as a neutral consultancy layer between vendors and customers with a keen focus on optimizing performance, workflows, and costs.

We're in the unique position to orchestrate full-stack, multi-vendor architectures such as multi-CDN, CDN+WAF+AWS, CDN+Mobile App optimization, dual-DNS, and other interesting setups.

Increase speed, availability and reliability of your website by learning from the experts in our FREE email course.

Learn everything you need to know about Bad Bot threats by downloading your FREE copy of Bad Bot Report 2018.

Find out the most important tips&tricks before selecting your next CDN provider in this FREE guide.

Find out all the specifics about web threats by downloading our FREE Field Guide to Modern Web Security.