Introducing UltraAPI: Bash bots and secure APIs.

Michael Smith
Field CTO

Michael Smith is Vercara's Field Chief Technology Officer and is responsible for the organization's overall technology strategy including product management, threat intelligence, customer support, and sales and channels enablement. Smith initially started as a Russian translator in the U.S. Army, before serving in CTO roles in startups and information security officer roles leading major government security projects. With over 30 years of experience in cybersecurity, information technology, and intelligence, he has managed high-profile incidents such as the wave of DDoS attacks against major U.S. banks in 2012 and 2013 and attacks by e-commerce account takeover gangs, as well as security monitoring for the 2014 FIFA World Cup and 2014 Winter Olympic Games, and preparations for both the 2018 and 2020 Olympic Games.

Michael Smith

Articles by Michael Smith

August 17, 2023

Detecting DNS Exfiltration and Tunneling with UltraDDR 

In the previous post of this series, we introduced DNS exfiltration and tunneling and explained the process of building queries...

August 8, 2023

Building a Web Honeypot on UltraWAF 

Introduction.  One of the important things for a vendor to do in their cyber threat Intelligence program is to build...

July 31, 2023

July 2023 UltraWAF Countermeasure of the Month 

In this recurring blog series, we discuss one of the countermeasures in UltraWAF, our Web Application Firewall and Bot Management...

July 25, 2023

Some of Our Favorite UltraDDR Policy Rules

Vercara’s Protective DNS service, UltraDDR, is designed to use its vast data lake of previously observed attacker infrastructure and correlate...

July 17, 2023

An Introduction to DNS Tunneling Detection & Data Exfiltration via DNS 

In February, we released Vercara UltraDNS Detection and Response, or UltraDDR.  This is a filtering DNS resolver powered by a...

July 5, 2023

Three Load-Balancing Techniques for DDoS Mitigation and Web Application Firewall 

I was talking to a customer several weeks ago about protection for their public-facing websites and services, and they asked,...

May 11, 2023

Four Techniques for Threat Hunting with UltraDDR

In February, we released UltraDDR, a filtering recursive DNS resolver service powered by a massive amount of historical and near-term...

February 15, 2023

DDoS Mitigation Technologies Part 5: Create Your Plan

DDoS (distributed denial of service) attacks are a serious and persistent threat to every network. This series highlights the six...

February 8, 2023

DDoS Mitigation Technologies Part 4: Remotely Triggered Black Hole

DDoS (distributed denial of service) attacks are a serious and persistent threat to every network. This series highlights the six...

February 1, 2023

DDoS Mitigation Technologies Part 3: Third-Party Solutions

DDoS (distributed denial of service) attacks are a serious and persistent threat to every network. This series highlights the six...

January 25, 2023

DDoS Mitigation Techniques and Technologies Part 2: ISP Scrubbing Centers

DDoS (distributed denial of service) attacks are a serious and persistent threat to every network. This series highlights the six...

January 18, 2023

DDoS Mitigation Technologies Part 1: Overview

DDoS (distributed denial of service) attacks are a serious and persistent threat to every network. This series highlights the six...