"it security" Articles

Neustar Moves On from the Common Short Codes Registry

by Steve Edwards July 30th, 2015

For over 10 years, Neustar has managed the Common Short Codes (CSC) registry for CTIA, the telecom industry’s wireless association. We’re announcing today that Neustar’s contract with CTIA to manage the CSC registry will end on December 31, 2015. Read Full Article


Neustar Evaluated as Strong Performer in Forrester Wave for DDoS Protection

by Margee Abrams July 29th, 2015

We’re proud to announce that Neustar has been rated as a Strong Performer in the Forrester Wave of DDoS protection service providers. This is the first independent assessment of our DDoS services by a major analyst firm, and we’re happy to be recognized for our consistently positive performance. Read Full Article


How to Weather a DDoS Storm

by Neustar Engineering July 13th, 2015

Most IT departments have some kind of disaster recovery plan that includes reacting to natural events such as earthquakes, tornadoes, fire, or floods. But one disaster that’s far more likely to occur is manmade: a flood of bogus DDoS packets that can cripple your network infrastructure. Given its likelihood, IT administrators should seriously consider DDoS attacks in their disaster recovery plan. Read Full Article


The Role of Concurrent Users in Load Testing

by Donald Lee July 07th, 2015

While many customers understand the value of a load test as part of their holiday preparation, many might still have questions about specific parameters that factor into testing their websites. This blog post will discuss the concept of concurrent users as it applies to load testing. Read Full Article


DDoS Extortion and Bitcoin

by Neustar Engineering June 30th, 2015

Neustar has several clients who have recently been victim to crude extortion plots using DDoS as punishment for not paying a ransom. Extortion is certainly not a new trick by the hacker community, but there are several new developments, notably the use of Bitcoin as a method of payment. In this blog post, we’ll assess a recent extortion plot, profile the perpetrator, and outline solutions for any unfortunate victim of such a plot. Read Full Article