"it security" Articles

The .NYC Internet Domain Turns One

by Lori Anne Wardi October 08th, 2015

The City of New York is celebrating a special anniversary. One year ago today, the city opened public access to the “.nyc” Internet domain extension, giving New Yorkers the ability to have a web address that was uniquely their own. The exclusive advantage became an official way for the city’s businesses and residents to brand their identity online and showcase their location as a key to their success. Read Full Article


IDC Interviews Neustar on Latest DDoS Report

by Nikitas Magel October 07th, 2015

Following closely on the release of our Global DDoS Report, market research firm IDC interviewed Neustar’s Joe Loveless on the current state of wordwide cyberthreats. During the conversation, a sobering theme quickly emerged: It’s no longer a question of whether or when a company will experience a DDoS attack; the real question is how often. The reality is now, quite simply, that “breach is a foregone conclusion.” Read Full Article


We're Moving Forward. You Coming?

by Sean Kaine October 06th, 2015

New TLDs have incredible potential: helping brands create real-time marketing campaigns, personalizing consumer interactions across every channel, and instilling a deeper level of consumer trust. The Golden Age of the Internet is just beginning. Read Full Article


Five Tips for Enhanced DNS Reliability and Security

by Brendon Mitchell October 05th, 2015

Despite the constantly evolving threat of DNS attacks, many IT professionals are taking a status quo approach to DNS security and performance. But that could be a costly mistake. Five simple steps you can take will reduce the risk of website availability and security issues. Read Full Article


The Credit Card Fraud Shell Game

by Travis Abercrombie October 01st, 2015

It’s October 1, and if you’re like most Americans, you either have or will soon receive a new card in the mail that has a data-encrypted EMV chip. The EMV chip, already in-use overseas, is being used domestically at a time when companies are searching for ways to crack down on fraud and elevate the security associated with their brand. But reigning in fraud is like playing a shell game – once you think you’ve identified the target, the opposition adroitly moves and attempts to stay ahead. With that analogy in mind, it’s anticipated that fraudsters will move more of their illegal activities from point-of-purchase to the anonymity of online, as has been witnessed in countries that have already adopted EMV. Read Full Article