"security" Articles

What Holds Firms Back from Choosing Cloud-Based External DNS?

by Tomás Hernandez March 31st, 2016
What Holds Firms Back from Choosing Cloud-Based External DNS?

Cloud-based domain name server (DNS) technology has significant business advantages. Yet a majority of enterprises choose to keep their external DNS deployments on premise. To learn why, Neustar recently commissioned Forrester Consulting to survey a sample of midmarket and enterprise firms. The study measured their rates of external DNS deployment to the cloud and inquired into what either encouraged or discouraged such migrations. Read Full Article

Webinar: What You Need to Know About DDoS and How It Threatens Your Business

by Tomás Hernandez March 24th, 2016
Webinar: What You Need to Know About DDoS and How It Threatens Your Business

DDoS attacks have been legitimized as a weapon of cyber warfare and are increasing used by those with sinister motives in conjunction with other nefarious activities including breach, theft, and destruction. Join us on Tuesday, April 5, 2016 at 1:00 PM ET, Dark Reading will host a Neustar-sponsored webinar to discuss the latest insights on attacks and trends, and ways you can better detect and defeat the DDoS threats to your business. Read Full Article

Holiday Threats Are Only Nine Months Away. Are You Ready?

by Tomás Hernandez March 17th, 2016
Holiday Threats Are Only Nine Months Away. Are You Ready?

With warmer weather and longer days, spring is fast approaching. Year-end holidays are the furthest thing from the minds of most consumers. But now is actually the perfect time for online retailers to prepare their websites from breach or crash. Forrester Research recently outlined seven steps for security and risk professionals to protect their ecommerce websites from online threats as well as to recover quickly and minimize damage should a breach or failure occur. Read Full Article

The Most Dangerous Season: Timing and Frequency of Multi-vector Attacks

by Neustar Engineering March 1st, 2016
The Most Dangerous Season: Timing and Frequency of Multi-vector Attacks

During RSA Conference 2016, Neustar will preview some findings from our upcoming Security Operations Center (SOC) Report. The report chronicles attacks that the Neustar SOC team spotted and mitigated in 2015. As part of a three-part series covering different aspects of the SOC findings, this blog post discusses the timing and frequency of multi-vector attacks, a troubling trend on the rise. Read Full Article

Just Enough Is Good Enough: The Profile of Multi-vector Attacks

by Neustar Engineering February 29th, 2016
Just Enough Is Good Enough: The Profile of Multi-vector Attacks

During RSA Conference 2016, Neustar will preview some findings from our upcoming Security Operations Center (SOC) Report. The report chronicles attacks that the Neustar SOC team spotted and mitigated in 2015. As part of a three-part series covering different aspects of the SOC findings, this blog post profiles multi-vector attacks, a troubling trend on the rise. Read Full Article