"dns and availability" Articles

The Most Dangerous Season: Timing and Frequency of Multi-vector Attacks

by Neustar Engineering March 1st, 2016
The Most Dangerous Season: Timing and Frequency of Multi-vector Attacks

During RSA Conference 2016, Neustar will preview some findings from our upcoming Security Operations Center (SOC) Report. The report chronicles attacks that the Neustar SOC team spotted and mitigated in 2015. As part of a three-part series covering different aspects of the SOC findings, this blog post discusses the timing and frequency of multi-vector attacks, a troubling trend on the rise. Read Full Article

An Open Letter from Neustar’s CISO to our UltraDNS Customers

by Mark Tonnesen October 20th, 2015
An Open Letter from Neustar’s CISO to our UltraDNS Customers

On October 15, 2015, Neustar’s UltraDNS service experienced an outage as the unexpected result of a configuration change. We've begun a full review of our operational plans and service architecture in order to avoid these problems in the future. Having learned from this experience, we pledge to continue to improve our operations plans and implement new technologies to ensure that our UltraDNS is the best service of its kind. Read Full Article

Five Tips for Enhanced DNS Reliability and Security

by Brendon Mitchell October 5th, 2015
Five Tips for Enhanced DNS Reliability and Security

Despite the constantly evolving threat of DNS attacks, many IT professionals are taking a status quo approach to DNS security and performance. But that could be a costly mistake. Five simple steps you can take will reduce the risk of website availability and security issues. Read Full Article

How to Weather a DDoS Storm

by Neustar Engineering July 13th, 2015
How to Weather a DDoS Storm

Most IT departments have some kind of disaster recovery plan that includes reacting to natural events such as earthquakes, tornadoes, fire, or floods. But one disaster that’s far more likely to occur is manmade: a flood of bogus DDoS packets that can cripple your network infrastructure. Given its likelihood, IT administrators should seriously consider DDoS attacks in their disaster recovery plan. Read Full Article

DNS Hijacking and Phishing

by Raymond April 1st, 2015
DNS Hijacking and Phishing

Over the last few months, a number of high-profile companies have been hit by cyber attack, including Twitter, Lenovo, The New York Times, and The Huffington Post. In some cases, known hacker groups, such as the Syrian Electronic Army or Lizard Squad, used two well-known techniques to penetrate the victimized systems: DNS hijacking and phishing. But several solutions available on the market today could have prevented, halted, or minimized damage from the attacks. Read Full Article