"Security" Articles

Press X to DDoS (part 1)

Neustar Engineering
by Neustar Engineering April 19th, 2015
Press X to DDoS (part 1)

Every day millions of people play online video games. The tools of the trade are mostly familiar (controller, console, flat screen), but for some, they also include distributed denial-of-service (DDoS) attack tools to take their opponents offline or disrupt the platform itself. This is first in a two-part series on DDoS attacks on the gaming industry. This blog post is an overview of these attacks on the industry as a whole. Read Full Article

Is DDoS Mitigation a Commodity?

Bryant Rump
by Bryant Rump April 7th, 2015
Is DDoS Mitigation a Commodity?

As DDoS attacks have increased in number, complexity, and impact over the last few years, so has the number of DDoS mitigation service providers—in fact, there are a lot of them. Is DDoS mitigation now a commodity? Read Full Article

FAQs for SMBs: How Small and Medium Size Businesses Can Protect Against Cyber Attack

Glenn Yorkdale
by Glenn Yorkdale February 5th, 2015
FAQs for SMBs: How Small and Medium Size Businesses Can Protect Against Cyber Attack

Small and medium sized businesses often lack the budgets that larger companies have in protecting against cyber attack. Coupled with the fallacy that it’s primarily larger, higher profile organizations that get hacked, this has led to widespread vulnerability among smaller businesses. But there are steps these companies can—and should—take in reducing their vulnerability, all of whose benefits far outweigh their modest costs. Read Full Article

The Shape of Cyber Threats to Come: Rodney Joffe Speaks on 2015

Tomás Hernandez
by Tomás Hernandez January 8th, 2015
The Shape of Cyber Threats to Come: Rodney Joffe Speaks on 2015

2014 was a year rife with news of large-scale security breaches of high-profile, global organizations. JPMorgan, eBay, Home Depot, the European Central Bank, and the U.S. Postal Service all appeared in headlines as targets of cyber attack. After all that cyber scandal, what more could possibly be in store for 2015? To answer that, I turned to Neustar’s resident expert, Senior Vice President and Fellow Rodney Joffe, who shared some intriguing tidbits about the current state of cyber threats Read Full Article

Using the WPM Bulk Service Creation & Deletion Tool

Tyler Fullerton
by Tyler Fullerton December 31st, 2014
Using the WPM Bulk Service Creation & Deletion Tool

Often times I am tasked with configuring services and accounts on the Web Performance Management (WPM) platform to support Proof of Concepts (POC) for prospective customers. Sometimes this can be very easy, setting up a couple scripts and monitoring services while other times it can be quite complex. Read Full Article