figures
Blog

How to Block Ad Blockers, Bold Predictions For The CDN Industry And More in This Weeks News

Dror Arie
19.12.2016
image 3 Min read

Ad Integrity Solution from Instart Logic

Users of the internet are increasingly using ad blockers, and by the end of 2016, ad blockers would have cost publishers $41.4 billion globally in lost ad revenue. Facebook already made the announcement that they’ve started blocking ad blockers and are serving ads even if the user has ad blocker installed. Instart Logic has announced that they now have a service for everyone else who wants to do the same thing. It’s called Ad Integrity Solution, and it leverages Nanovisor web virtualization technology which intercepts browser API calls on behalf of clients’ websites. It also uses cloud-based algorithms to seamlessly integrate ad content into websites, allowing them to escape the notice of ad blockers.

stop-ads

Image Source

Read more: Instart Logic, Nanovisor

Bold CDN industry predictions for 2017 by Bizety

2016 has been a big year for the content delivery market and a lot of stuff has happened from which we’ve covered everything on this blog including the biggest resource about CDNs currently available. Right now, Bizety has some ‘bold’ predictions to present in their new article – here they are:

  1. $.002/GB for 1PB/month will become the new norm (that’s 20% of 1 penny)
  2. CloudFlare will get Acquired by Google
  3. Oracle will acquire a CDN not named Akamai
  4. Ns1 will get acquired by IBM or Microsoft
  5. CloudFront + Google CDN + Azure CDN will triple their existing CDN market share
  6. Akamai will acquire two startups: 1) pure-play bot mitigation company and 2) client-side malware protection startup
  7. AWS business model will start showing cracks and EC2 will have new competition
  8.  Edge Security and client-side security business models will converge
  9. Delivery infrastructure platforms such as Nginx, Varnish, Wowza and Red5 will continue to move into CDN services, accelerating DIY CDN deployments

Read more: Bizety

Anatomy of the recent IoT attacks

Fastly did an analysis on the recent attacks that were hosted by the internet of things devices and reported some never-before-seen numbers that provide an insight of how an attack had looked like on a specific device. Some interesting facts are that from the time an IoT device was connected to the internet, it took an average of 6 minutes for it to launch an attack, IoT devices were probed for vulnerabilities around 800 times per hour and over the span of a day, there has been sights of over 400 logins on a single device.

iot-devices

Image Source

Read the full analysis: Fastly Blog

‘Hoarder bots’ and why are they dangerous

These malicious automated attackers continually add hot products to shopping carts, depleting the inventory an e-retailer believes it has available to ship. This type of attack is less known, but still highly disruptive and needs to be addressed appropriately. A recent attack like this happened to one of PerimiterX’s ecommerce customers and lasted for nearly 3 hours targeting the hottest product on the website at the time. Another similar attack lasted for 18 hours.

Read more: PerimiterX Blog

Dyn suggests using a backup DNS provider

Having just one DNS provider isn’t enough, and Dyn has supplied their customers with everything they need to enlist a secondary DNS provider if the primary one fails. There are several ways to adopt this approach – traditional primary-secundary, hidden master – secondary and primary – primary approach – each has some different specifics that may or may not be right for your business, and to find out which one is right, they encourage you to read their whitepaper. If you’re unsure where to go from here, you can always contact GlobalDots for help, we’re available 24/7.

Read more: Dyn Blog

Comments

0 comments

There’s more to see

slider item
Your Innovation Feed

eBook: Don’t Fortify, Amplify: The New Cloud Security Stack

Steven Puddephatt 25.11.21

2021’s Security leaders deal with everything from cloud-native insider threats to staying one step ahead of the unknown. While the cloud is made to amplify and speed up core business processes, the pressure to fortify cloud-borne assets from possible cyber threats painfully slows things down.  GlobalDots harnessed its 17-year cloud security experience to rethink cloud […]

Read more
slider item
Identity & Access Management (IAM)

How IT can Breeze through Onboardings without Additional Hirings

Dror Arie

Which IT Nuisance Would You Automate First? Employee onboarding is one of the heaviest, most complex operations on a company’s IT. This is especially true in fast-growing companies that may see multiple onboardings per day. And, of course, the wider a company’s software tools array, the more accounts to create and permissions to manage. In […]

Read more
slider item
Cloud Workload Protection

GlobalDots Partners with CWP Innovator Lacework

Li-Or Amir 23.11.21

In its constant endeavor to enrich its cloud security offering with the latest innovation, GlobalDots has recently introduced security unicorn Lacework to its vendor portfolio. Founded in 2015, Lacework offers a cloud security monitoring platform which brings together some of today’s top needs: Workload protection, container & K8s security, compliance monitoring. Last weekend (Nov. 18th, […]

Read more

Unlock Your Cloud Potential

Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.
Contact us
figure figure figure figure figure