"Security" Articles

Holiday Threats Are Only Nine Months Away. Are You Ready?

Tomás Hernandez
by Tomás Hernandez March 17th, 2016
Holiday Threats Are Only Nine Months Away. Are You Ready?

With warmer weather and longer days, spring is fast approaching. Year-end holidays are the furthest thing from the minds of most consumers. But now is actually the perfect time for online retailers to prepare their websites from breach or crash. Forrester Research recently outlined seven steps for security and risk professionals to protect their ecommerce websites from online threats as well as to recover quickly and minimize damage should a breach or failure occur. Read Full Article

The Most Dangerous Season: Timing and Frequency of Multi-vector Attacks

Neustar Engineering
by Neustar Engineering March 1st, 2016
The Most Dangerous Season: Timing and Frequency of Multi-vector Attacks

During RSA Conference 2016, Neustar will preview some findings from our upcoming Security Operations Center (SOC) Report. The report chronicles attacks that the Neustar SOC team spotted and mitigated in 2015. As part of a three-part series covering different aspects of the SOC findings, this blog post discusses the timing and frequency of multi-vector attacks, a troubling trend on the rise. Read Full Article

Just Enough Is Good Enough: The Profile of Multi-vector Attacks

Neustar Engineering
by Neustar Engineering February 29th, 2016
Just Enough Is Good Enough: The Profile of Multi-vector Attacks

During RSA Conference 2016, Neustar will preview some findings from our upcoming Security Operations Center (SOC) Report. The report chronicles attacks that the Neustar SOC team spotted and mitigated in 2015. As part of a three-part series covering different aspects of the SOC findings, this blog post profiles multi-vector attacks, a troubling trend on the rise. Read Full Article

Opportunists in the Woodwork: Security Exploits on the Internet of Things

Neustar Engineering
by Neustar Engineering February 17th, 2016
Opportunists in the Woodwork: Security Exploits on the Internet of Things

It is estimated that there will be some 212 billion IoT devices by the year 2020. The unfortunate reality is that with every great technological shift, there will be new avenues for abuse, theft, and mischief. In fact, there are new exploits that are already impacting the Internet of Things and shaping the strategies of cyber attacks against it. Read Full Article

Is DNS the Rodney Dangerfield of Your Cybersecurity Strategy?

Travis Abercrombie
by Travis Abercrombie February 2nd, 2016
Is DNS the Rodney Dangerfield of Your Cybersecurity Strategy?

Rodney Dangerfield was known for his comedic timing, crazy facial expressions, and catch phrase that seemingly resonated with everybody: “I get no respect.” In that same vein, the domain name system (DNS) is perhaps the single-most important entity of the Internet that goes underappreciated, unnoticed… and unsecured. The good news is that you can protect your business and DNS from threats. Read Full Article