Michael Smith is Vercara's Field Chief Technology Officer and is responsible for the organization's overall technology strategy including product management, threat intelligence, customer support, and sales and channels enablement. Smith initially started as a Russian translator in the U.S. Army, before serving in CTO roles in startups and information security officer roles leading major government security projects. With over 30 years of experience in cybersecurity, information technology, and intelligence, he has managed high-profile incidents such as the wave of DDoS attacks against major U.S. banks in 2012 and 2013 and attacks by e-commerce account takeover gangs, as well as security monitoring for the 2014 FIFA World Cup and 2014 Winter Olympic Games, and preparations for both the 2018 and 2020 Olympic Games.
Detecting DNS Exfiltration and Tunneling with UltraDDR
In the previous post of this series, we introduced DNS exfiltration and tunneling and explained the process of building queries...
Building a Web Honeypot on UltraWAF
Introduction. One of the important things for a vendor to do in their cyber threat Intelligence program is to build...
July 2023 UltraWAF Countermeasure of the Month
In this recurring blog series, we discuss one of the countermeasures in UltraWAF, our Web Application Firewall and Bot Management...
Some of Our Favorite UltraDDR Policy Rules
Vercara’s Protective DNS service, UltraDDR, is designed to use its vast data lake of previously observed attacker infrastructure and correlate...
An Introduction to DNS Tunneling Detection & Data Exfiltration via DNS
In February, we released Vercara UltraDNS Detection and Response, or UltraDDR. This is a filtering DNS resolver powered by a...
Three Load-Balancing Techniques for DDoS Mitigation and Web Application Firewall
I was talking to a customer several weeks ago about protection for their public-facing websites and services, and they asked,...
Four Techniques for Threat Hunting with UltraDDR
In February, we released UltraDDR, a filtering recursive DNS resolver service powered by a massive amount of historical and near-term...
DDoS Mitigation Technologies Part 5: Create Your Plan
DDoS (distributed denial of service) attacks are a serious and persistent threat to every network. This series highlights the six...
DDoS Mitigation Technologies Part 4: Remotely Triggered Black Hole
DDoS (distributed denial of service) attacks are a serious and persistent threat to every network. This series highlights the six...
DDoS Mitigation Technologies Part 3: Third-Party Solutions
DDoS (distributed denial of service) attacks are a serious and persistent threat to every network. This series highlights the six...
DDoS Mitigation Techniques and Technologies Part 2: ISP Scrubbing Centers
DDoS (distributed denial of service) attacks are a serious and persistent threat to every network. This series highlights the six...
DDoS Mitigation Technologies Part 1: Overview
DDoS (distributed denial of service) attacks are a serious and persistent threat to every network. This series highlights the six...
Cloud infrastructure and cybersecurity services for DNS, DDoS and web applications.
Cybersecurity Insights
Directly to your inbox once a month.