Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Twitter falls prey to DDoS attack

Lumension Security : 10 August, 2009  (Technical Article)
Lumension comments on the recent Distributed Denial-of-Service attack that brought down the Twitter social networking community
As Twitter is brought to a standstill by DDoS, Lumension questions where Twitter is placing security in its business model.

Don Leatham, Senior Director of Solutions and Strategy for Lumension, comments: "Twitter has aggressively and successfully focused on developing features and building applications to drive user numbers, and it has grown in leaps in bounds internationally. But, this DDoS attack should highlight to Twitter that it needs to redirect some of this energy to bolster its core security measures in order to protect its millions of users.

"Increasingly, businesses are adopting Twitter as a core part of their social media and communications strategies, and this incident has the potential to have a negative impact on their brands using Twitter, as it could be seen to be highly vulnerable to malicious attack.

"Obviously, both individual employees and businesses need to take some responsibility when using any online application, including Twitter. The real question here is, 'is Twitter ready for business primetime?' Its model is more targeted to individual users, and what businesses have to consider before using these applications is 'where does security sit within the business priority and is it business friendly?'

"Further, Twitter has to adopt a similar approach to how Microsoft deals with vulnerabilities in its software. For example, shutting down and putting out an alert via its communications team, informing users that it is taking precautions until the issue has been resolved. Today, Twitter should have taken more steps to inform and update in order to protect business and consumer users."
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo