"it security" Articles

UltraDNS Adds EDNS Support to Enhance Directional Routing

by Raymond February 17th, 2015

Neustar is continuously working to improve our UltraDNS network and services for our customers. As of Sunday, February 15th, Neustar enabled support for EDNS client-subnet requests on our authoritative UltraDNS service. Read Full Article


.US TLD: the Year in Review, the Year Ahead

by Stephanie Duchesneau February 11th, 2015

The Chair and Vice Chair of the inaugural .US TLD Stakeholder Council summarize accomplishments in 2014 and developments in 2015. Read Full Article


FAQs for SMBs: How Small and Medium Size Businesses Can Protect Against Cyberattack

by Glenn Yorkdale February 05th, 2015

Small and medium sized businesses often lack the budgets that larger companies have in protecting against cyberattack. Coupled with the fallacy that it’s primarily larger, higher profile organizations that get hacked, this has led to widespread vulnerability among smaller businesses. But there are steps these companies can—and should—take in reducing their vulnerability, all of whose benefits far outweigh their modest costs. Read Full Article


The Shape of Cyberthreats to Come: Rodney Joffe Speaks on 2015

by Nikitas Magel January 09th, 2015

2014 was a year rife with news of large-scale security breaches of high-profile, global organizations. JPMorgan, eBay, Home Depot, the European Central Bank, and the U.S. Postal Service all appeared in headlines as targets of cyberattack. After all that cyber scandal, what more could possibly be in store for 2015? To answer that, I turned to Neustar’s resident expert, Senior Vice President and Fellow Rodney Joffe, who shared some intriguing tidbits about the current state of cyberthreats Read Full Article


Complacency Over DDoS Highest Among Businesses Most Vulnerable

by Nikitas Magel December 29th, 2014

Businesses with the most to lose from DDoS attacks tend to place the least value in mitigation efforts, according to a recent survey sponsored by Kapersky Labs. The cause for this disconnect between them is speculated to be an industry common—but faulty—prioritization of the confidentiality and integrity of data over its availability. Read Full Article