Dwight Davis

Dwight Davis

Independent Writer, Researcher, Consultant

Dwight Davis has reported on and analyzed computer and communications industry trends, technologies and strategies for more than 35 years.

DDoS in 2018: A Shift from Crashing Sites to Penetrating Them

What’s Next for Cybersecurity in 2018?

What’s Next for Cybersecurity in 2018?  By Dwight Davis Is it possible to anticipate what the coming year will bring us – pro and con – on the cybersecurity front? Making precise predictions about one of the most dynamic sectors...

Reputation Counts When It Comes to Assessing IP Address Risks

Reputation Counts When It Comes to Assessing IP Address Risks

In the shadowy world of cybersecurity, obvious and indisputable threats are more the exception than the rule. If that weren’t the case, it would be a lot simpler to identify and counter malicious actors, traffic, and websites.

Cybersecurity Budgets Across the Globe

Cybersecurity Budgets Across the Globe By Dwight Davis According to a recent AT&T-sponsored survey, the type and amount of your cybersecurity investments may be significantly influenced by the region in which your organization...

Do Dangerous Gaps Exist in Your Cybersecurity Investments?

Do Dangerous Gaps Exist in Your Cybersecurity Investments? By Dwight Davis Are there any companies today that don’t take cyberthreats seriously? Maybe a handful, but they are outliers in a world in which cybersecurity has become a...

It only takes once: DDoS attacks succeed even as some attack rates fall

It only takes once: DDoS attacks succeed even as some attack rates fall

One of our most popular aphorisms has flip side. Namely, for every silver lining, there may well be a dark cloud lurking.

Enhancing DDoS Defenses with a Web Application Firewall

Enhancing DDoS Defenses with a Web Application Firewall

Talk to any cybersecurity professional, and it won’t be long before you hear the word “layered approach.” The variety of cyber threats today – as well as the vulnerabilities they target – are so diverse that organizations can only...

DDoS Threat Drives Automation in Both Analysis and Response

DDoS Threat Drives Automation in Both Analysis and Response

The fact that even more organizations are taking longer to counter DDoS attacks today than was the case a year ago is troubling.

How Overconfidence Can Lead to Lax Cybersecurity

How Overconfidence Can Lead to Lax Cybersecurity By Dwight Davis Do you have confidence that your in-house security personnel has the knowledge, experience and technology to defend against cyberattacks? If so, there’s a chance...

Subpar IP Decisioning Data Can Drive Risky Security Decisions

Subpar IP Decisioning Data Can Drive Risky Security Decisions

Cyber threats have driven companies to invest heavily in security data, technologies and services.

Complying with Country-Access Restrictions Using IP Intelligence

Complying with Country-Access Restrictions Using IP Intelligence

Not every sanctions program involves online access restrictions -- but some do. And, it’s up to individual companies to understand and follow the sanctions as they apply.

Combating Cyber Fraud with IP Intelligence

Combating Cyber Fraud with IP Intelligence

When it comes to cybersecurity trends, good news can be hard to come by. A recent report on cyber fraud did find a rare silver lining.

Load More