neustar.biz
Tag Archives | security

Who’s Who in the New Dot Brandscape… And Why Should You Care?

Let’s go to the scoreboard. There are 1751 applications for new top-level domains. Nearly 1/3 (635) are brands. The rest are generics (e.g. .Buzz) and geographies (e.g .NYC). So, brands are definitely interested in new TLDs – and a handful of major industries have jumped into the lead. If you’re in any of those verticals, […]

Read full story Comments { 0 }

Brand TLDs: Four Reasons To Move From .COM To Your .BRAND

Ask Google, Amazon, AXA and hundreds of other brands: branded top-level domains are the future of the web. Since 2012, when the Internet Corporation of Assigned Names and Numbers (ICANN) opened up applications for new TLDs, more than 600 businesses have submitted applications for branded TLDs. Should your company launch a .brand TLD? Absolutely, says […]

Read full story Comments { 0 }

The top threats to your nTLD—and how you can stop them.

Until now, the criminals behind malware and phishing have had only 22 generic top-level domain names (TLDs) to abuse – names like .com, .net or .org. But with hundreds of new TLDs entering the marketplace, e.g. .buzz, .email, and .shop, the targets are more plentiful and tempting. Fortunately, Neustar can help with a full set […]

Read full story Comments { 0 }

Marketers: DDoS attacks aren’t just IT’s problem anymore.

When DDoS attacks hit, the damage spreads widely. According to the Neustar 2014 Annual DDoS Attacks and Impact Report, departments outside of IT and security—call centers, customer service and marketing, for example—collectively pay over half of attack-related costs. Why? Unhappy customers flood the call center when your site goes down. Customer service is overwhelmed and […]

Read full story Comments { 0 }

IDC: “Neustar Offers an Advanced Hybrid DDoS Solution.”

It’s a story as old as business itself: threats emerge and businesses adapt or pay the price. The tale is playing out now in the DDoS arena, according to global market intelligence firm IDC. With distributed denial of service attacks now evolving and spawning hybrids, DDoS protection is following suit. And Neustar is taking the […]

Read full story Comments { 0 }

DDoS Mitigation in the UK: Hope Isn’t a Strategy There Either

In the spring, Neustar released survey results from Information Technology professionals on the state of distributed denial of service (DDoS) attacks in the United States. We found that when it comes to DDoS, it’s not really a question of “if” it’ll happen to U.S. businesses; it’s a question of “when” it will happen. In a […]

Read full story Comments { 0 }

Physical Office Security in a Digital Security World

Everyone breaks building security policies at some point, whether you let someone in a locked door behind you or neglect to sign a guest in properly. Does it really matter? Does your office even have a policy? We typically spend so much time on other aspects of security, such as protecting our online presences against […]

Read full story Comments are closed

What do you mean my password isn’t strong enough?

Everyone has, at one point or another, been asked to create a password only to be told that the password is not strong enough or “the password does not meet complexity requirements”. The continued advancement of technology has enabled computers to crunch numbers faster and faster, in turn, making it easier for hackers to identify […]

Read full story Comments are closed

Security and Reliability: A Closer Look at Penetration Testing

As noted in my first article of this series, security and reliability encompass holistic network assessments, vulnerability assessments and penetration testing. This month I’d like to go deeper into penetration testing; however, first, let’s go back for a quick refresh before getting started. There are three broad steps any organization can take with respect to security and […]

Read full story Comments are closed

Social Engineering – Five Best Practices for Defending Yourself

As you start reviewing your security strategies in 2013 and implementing new processes and procedures, I highly recommend you review your policies related to social engineering, which is a non-technical kind of intrusion that relies on human interaction and involves tricking people into breaking normal security policies.  There are many easy and inexpensive steps that […]

Read full story Comments are closed