"it security" Articles

Client Library for Web Performance Management API

by Tyler Fullerton April 22nd, 2015

The Neustar Web Performance Management platform has a very robust API. If you haven't checked it out yet I highly recommend it, with it you can perform: instant tests, manage monitoring services and load tests, create maintenance windows, and interact with your RUM beacons and data. Read Full Article


US DDoS Attacks: Growing Investments, Hybridized Strategies

by Nikitas Magel April 22nd, 2015

Distributed denial of service (DDoS) attacks in the US are becoming considerably more prevalent, costly, and complex. While that in itself may not be big news, what is unexpected is that in just the last year, forward-thinking companies have significantly boosted their investments and hybridized their strategies to better defend against cyberattack. Read Full Article


Press X to DDoS (part 1)

by Neustar Engineering April 19th, 2015

Every day millions of people play online video games. The tools of the trade are mostly familiar (controller, console, flat screen), but for some, they also include distributed denial-of-service (DDoS) attack tools to take their opponents offline or disrupt the platform itself. This is first in a two-part series on DDoS attacks on the gaming industry. This blog post is an overview of these attacks on the industry as a whole. Read Full Article


Why a CMO Is Attending the World’s Largest Security Event

by Lisa Joy Rosner April 16th, 2015

As a veteran CMO, I’ve been to my share of CMO- and marketing-focused conferences. But next week, I’ll be joining my colleagues at the world’s largest security event: RSA Conference 2015. While RSA is the premier event for the security industry, I think we’ll be seeing more and more CMOs at security events in the coming years. Read Full Article


Is DDoS Mitigation a Commodity?

by Bryant Rump April 07th, 2015

As DDoS attacks have increased in number, complexity, and impact over the last few years, so has the number of DDoS mitigation service providers—in fact, there are a lot of them. Is DDoS mitigation now a commodity? Read Full Article