Dwight Davis

Dwight Davis

Independent Writer, Researcher, Consultant

Dwight Davis has reported on and analyzed computer and communications industry trends, technologies and strategies for more than 35 years.

Crystal Balling the Future of Application Security

How to Write Secure New Code and Reduce ‘Security Debt’

How to Write Secure New Code and Reduce ‘Security Debt’

It’s no secret that the volume, sophistication, and consequences of cyber attacks have escalated dramatically in recent years. That trend has organizations scrambling to tighten up the security of the software applications they’re...

DDoS in 2018: A Shift from Crashing Sites to Penetrating Them

DDoS in 2018: A Shift from Crashing Sites to Penetrating Them

With the proliferation of millions of poorly secured IoT devices, these attackers also have a ready and growing source of “fuel” to power massive botnets and generate crippling volumes of requests.

What’s Next for Cybersecurity in 2018?

What’s Next for Cybersecurity in 2018?  By Dwight Davis Is it possible to anticipate what the coming year will bring us – pro and con – on the cybersecurity front? Making precise predictions about one of the most dynamic sectors...

Reputation Counts When It Comes to Assessing IP Address Risks

Reputation Counts When It Comes to Assessing IP Address Risks

In the shadowy world of cybersecurity, obvious and indisputable threats are more the exception than the rule. If that weren’t the case, it would be a lot simpler to identify and counter malicious actors, traffic, and websites.

Cybersecurity Budgets Across the Globe

Cybersecurity Budgets Across the Globe By Dwight Davis According to a recent AT&T-sponsored survey, the type and amount of your cybersecurity investments may be significantly influenced by the region in which your organization...

Do Dangerous Gaps Exist in Your Cybersecurity Investments?

Do Dangerous Gaps Exist in Your Cybersecurity Investments? By Dwight Davis Are there any companies today that don’t take cyberthreats seriously? Maybe a handful, but they are outliers in a world in which cybersecurity has become a...

It only takes once: DDoS attacks succeed even as some attack rates fall

It only takes once: DDoS attacks succeed even as some attack rates fall

One of our most popular aphorisms has flip side. Namely, for every silver lining, there may well be a dark cloud lurking.

Enhancing DDoS Defenses with a Web Application Firewall

Enhancing DDoS Defenses with a Web Application Firewall

Talk to any cybersecurity professional, and it won’t be long before you hear the word “layered approach.” The variety of cyber threats today – as well as the vulnerabilities they target – are so diverse that organizations can only...

DDoS Threat Drives Automation in Both Analysis and Response

DDoS Threat Drives Automation in Both Analysis and Response

The fact that even more organizations are taking longer to counter DDoS attacks today than was the case a year ago is troubling.

How Overconfidence Can Lead to Lax Cybersecurity

How Overconfidence Can Lead to Lax Cybersecurity By Dwight Davis Do you have confidence that your in-house security personnel has the knowledge, experience and technology to defend against cyberattacks? If so, there’s a chance...

Subpar IP Decisioning Data Can Drive Risky Security Decisions

Subpar IP Decisioning Data Can Drive Risky Security Decisions

Cyber threats have driven companies to invest heavily in security data, technologies and services.

Load More