Tactical Guide to Perimeter Exposures

Showing results for 
Show  only  | Search instead for 
Did you mean: 
L2 Linker
Did you find this article helpful? Yes No
No ratings

Some types of cyberattacks are straightforward and easy to handle. Phishing tries to trick users into opening a link or entering their credentials. Distributed denial-of-service (DDoS) attacks flood websites with so much traffic that real communications can’t get through.


Other network attacks are more difficult to understand. The details of the threat exposure can have a big influence on the complexity of the attack and the nature of its impact on your networks. In this paper, we highlight five of the more intricate perimeter exposures and discuss how you can defend against them.


Learn more.

Rate this article:
Register or Sign-in
Article Dashboard
Version history
Last update:
‎09-02-2021 12:32 PM
Updated by: