neustar.biz
Tag Archives | security

IDC: “Neustar Offers an Advanced Hybrid DDoS Solution.”

It’s a story as old as business itself: threats emerge and businesses adapt or pay the price. The tale is playing out now in the DDoS arena, according to global market intelligence firm IDC. With distributed denial of service attacks now evolving and spawning hybrids, DDoS protection is following suit. And Neustar is taking the […]

Read full story Comments { 0 }

DDoS Mitigation in the UK: Hope Isn’t a Strategy There Either

In the spring, Neustar released survey results from Information Technology professionals on the state of distributed denial of service (DDoS) attacks in the United States. We found that when it comes to DDoS, it’s not really a question of “if” it’ll happen to U.S. businesses; it’s a question of “when” it will happen. In a […]

Read full story Comments { 0 }

Physical Office Security in a Digital Security World

Everyone breaks building security policies at some point, whether you let someone in a locked door behind you or neglect to sign a guest in properly. Does it really matter? Does your office even have a policy? We typically spend so much time on other aspects of security, such as protecting our online presences against […]

Read full story Comments are closed

What do you mean my password isn’t strong enough?

Everyone has, at one point or another, been asked to create a password only to be told that the password is not strong enough or “the password does not meet complexity requirements”. The continued advancement of technology has enabled computers to crunch numbers faster and faster, in turn, making it easier for hackers to identify […]

Read full story Comments are closed

Security and Reliability: A Closer Look at Penetration Testing

As noted in my first article of this series, security and reliability encompass holistic network assessments, vulnerability assessments and penetration testing. This month I’d like to go deeper into penetration testing; however, first, let’s go back for a quick refresh before getting started. There are three broad steps any organization can take with respect to security and […]

Read full story Comments are closed

Social Engineering – Five Best Practices for Defending Yourself

As you start reviewing your security strategies in 2013 and implementing new processes and procedures, I highly recommend you review your policies related to social engineering, which is a non-technical kind of intrusion that relies on human interaction and involves tricking people into breaking normal security policies.  There are many easy and inexpensive steps that […]

Read full story Comments are closed

Security and Reliability: A Closer Look at Vulnerability Assessments

Building on my last article about Network Assessments, let’s take a closer look at vulnerability assessments. (Because entire books have been written on conducting vulnerability assessments, this article is only a high level overview.) What is a vulnerability assessment? A vulnerability assessment can be viewed as a methodology for identifying, verifying and ranking vulnerabilities (a […]

Read full story Comments are closed

Frogger — And Other Tales Of APT Leaping Forward

Neustar SVP and Senior Technologist Rodney Joffe spoke at Forrester’s Security Forum 2012 and described the advanced persistent threat (APT), why it’s important and what resources you’d need to beat one. And he did it all using the classic Atari game, Frogger, as a metaphor. We thought you’d enjoy the talk. (Thank you to Forrester […]

Read full story Comments { 0 }

ICANN Reveal Day; Password Leaks; Disruptive Innovation

Here’s our roundup of the headlines that got our attention this week–from both inside Neustar and out. ICANN Reveals TLD Applicants [various]  – ICANN announced the TLD applicants this week and we collected the news that caught our eyes this week. LinkedIn, eHarmony, Last.fm Hacks Highlight Bad Passwords [Washington Post] – We all changed our […]

Read full story Comments { 0 }
Lessons from Telecom Industry in 2011

Lessons from the Telecom Industry

This year proved to be another pivotal year in the transformation of the telecommunications landscape. In the U.S., the Federal Communications Commission (FCC) tackled big issues including carrier consolidation, net neutrality, universal broadband and inter-carrier billing. The operators themselves raced toward the promise of 4G. AT&T and T-Mobile announced their union and then announced it […]

Read full story Comments { 0 }