IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

The IT Pro Podcast: Inside the DDoS arms race

They’re still among the most common cyber attacks - but what makes DDoS so popular?

The IT Pro Podcast: Inside the DDoS arms race

Cyber attacks are something that every business worries about on a near-constant basis - but while DDoS attacks may not make it onto many CISOs lists of the most worrying threats, they remain one of the most prevalent types of attack - partly because they’re dangerously easy to launch.

The scale and speed with which DDoS attacks can be launched is lowering all the time, too, thanks to the spread of IoT-driven botnets and the rise of DDoS-as-a-service vendors. One of the companies on the front line of defending against this threat is Cloudflare, and in this episode of the IT Pro Podcast, we’re joined by Cloudflare CTO John Graham-Cumming to discuss the tactics used to mount these attacks, and why they’re never really going to go away.

Highlights

“If you think back a few years, when you think about DDoS, it was often just that the website was not online for a business. And at a time when websites were primarily marketing tools, almost a brochure, it mattered from a reputation perspective and some loss of business. But of course, we've switched to using the internet for pretty much everything. I mean, look at us talking like this over the internet and schooling and working from home and ordering lunch. And you imagine the myriad of things we do on the internet; all of those things are vulnerable to DDoS attacks.” 

“We built our systems up so that they can detect and mitigate this stuff, automatically. And from a capacity perspective, because we built the network to be very, very large, we don't worry about the size of attacks. Obviously, we worry in the sense of planning for bigger and bigger attacks, and making sure we have the infrastructure in place, making sure our systems are working… but in both the case of the two terabit per second attack, and in the case of the 17 million requests per second attack, those are just automatically mitigated.” 

“We see continuous attacks of all sizes, and it seems to be growing, unfortunately. I had kind of hoped this problem would slow down, but it doesn't seem to be doing so. Sadly, DDoS is just part of what we deal with. It's almost like it's the background noise of the internet, there's always some nonsense going on.”

Read the full transcript here.

Footnotes

Subscribe

Featured Resources

IT best practices for accelerating the journey to carbon neutrality

Considerations and pragmatic solutions for IT executives driving sustainable IT

Free Download

The Total Economic Impact™ of IBM Spectrum Virtualize

Cost savings and business benefits enabled by storage built with IBMSpectrum Virtualize

Free download

Using application migration and modernisation to supercharge business agility and resiliency

Modernisation can propel your digital transformation to the next generation

Free Download

The strategic CFO

Why finance transformation propels business value

Free Download

Recommended

Can generative AI change security?
artificial intelligence (AI)

Can generative AI change security?

24 Mar 2023
ITPro Podcast: The changing face of cyber warfare
cyber warfare

ITPro Podcast: The changing face of cyber warfare

17 Mar 2023
IT Pro Podcast: Are chief metaverse officers here to stay?
Network & Internet

IT Pro Podcast: Are chief metaverse officers here to stay?

10 Mar 2023
The IT Pro Podcast: Is this the beginning of the end for open source?
open source

The IT Pro Podcast: Is this the beginning of the end for open source?

3 Mar 2023

Most Popular

The big PSTN switch off: What’s happening between now and 2025?
Sponsored

The big PSTN switch off: What’s happening between now and 2025?

13 Mar 2023
Pension Protection Fund confirms employee data exposed in GoAnywhere breach
ransomware

Pension Protection Fund confirms employee data exposed in GoAnywhere breach

24 Mar 2023
Some GitHub users must take action after RSA SSH host key exposed
Security

Some GitHub users must take action after RSA SSH host key exposed

24 Mar 2023