"Security" Articles

The Role of Concurrent Users in Load Testing

Donald Lee
by Donald Lee July 7th, 2015
The Role of Concurrent Users in Load Testing

Do you still have questions about what factors into load testing your website? This post will discuss the concept of concurrent users as it applies to load testing. Read Full Article

Neustar's Rodney Joffe Honored with Lifetime Achievement Award

Tomás Hernandez
by Tomás Hernandez June 16th, 2015
Neustar's Rodney Joffe Honored with Lifetime Achievement Award

We’re proud to share news that Rodney Joffe, Senior Vice President and Fellow at Neustar, has been honored with the 2016 M3AAWG Mary Litynski Award for his lifetime achievements in protecting the Internet and its end-users. Joffe was presented with the award during the M3AAWG 34th General Meeting in Dublin, Ireland last week. It acknowledges Rodney’s long career as an influential and highly accomplished cybersecurity advocate. Read Full Article

Security Summit 2015 Recap

Tomás Hernandez
by Tomás Hernandez May 27th, 2015
Security Summit 2015 Recap

Last week, Neustar hosted our first-ever annual Security Summit—and it was a resounding success! Taking place in San Francisco’s Marriot Marquis, the summit gathered over 200 professionals from all aspects of security in the information technology sector. In all, it was an eye-opening and informative opportunity for everyone involved to learn the current state of cyber warfare and how to be prepared against its inevitable impacts. Here are some highlights from sessions of the summit. Read Full Article

Reusable Code in Your Selenium Scripts

Tyler Fullerton
by Tyler Fullerton May 19th, 2015
Reusable Code in Your Selenium Scripts

There are two ways that you can (currently) incorporate reusable code into your scripts. The first is by using the File object to store your JavaScript and then read the file content into a variable and use eval() on the variable. The second approach is to use the CSVTable object to store predefined functions and their parameter lists and then import them into strings and finally create Function objects out of them. Read Full Article

Infographic: 2015 DDoS Attacks and Protection

Tomás Hernandez
by Tomás Hernandez April 29th, 2015
Infographic: 2015 DDoS Attacks and Protection

Neustar's 2015 US DDoS Attacks and Protection report, released just last week, revealed some sobering statistics about the effects of DDoS attacks on American companies. The survey on which the report was based had been given to IT professionals—but the implications were very clear for their colleagues in marketing as well. Based on the report's data, we've highlighted some compelling ways in which it's not only security teams, but also marketers who feel the pain of DDoS attacks on their businesses. Read Full Article