"it security" Articles

Cloud DNS Management: Still Overlooked Despite Critical Need

by Charity Spiri September 03rd, 2015

DNS is an underappreciated yet fundamentally important part of the Internet. Simply put, it connects users to websites. But, as new research by UBM Tech has found, a significant number of organizations are not exploring the benefits of managed DNS providers. Read Full Article


Webinar: Protecting E-Commerce in High-Traffic Environments

by Nikitas Magel September 01st, 2015

If your organization does business on the Web, you will face crucial, high-traffic periods in the coming year that could make or break your bottom line. On Tuesday, September 15th at 1:00 pm ET, Information Week/Dark Reading will host a webinar on how attackers seek to exploit companies at their weakest—and most critical—moments of operation. Read Full Article


Ecommerce Holiday Preparedness: “What Ifs” for DNS and Traffic Management

by Donald Lee August 27th, 2015

The summer is almost over and it’s only a few months before the shopping season begins with Black Friday. Read about how to leverage cloud DNS services in your holiday “what if” preparedness. Read Full Article


What Erodes Trust in Digital Brands?

by Nikitas Magel August 25th, 2015

It’s no news that your website’s security is paramount to your business. But did you know how much security shapes the perception of your brand? And that’s not just when cyber-attacks and data breaches occur. That was one of the messages from a recent survey by the Ponemon Institute, which Neustar sponsored to learn what people expect when they visit a website—and how those expectations affect their opinion of a brand. Read Full Article


Ten Cyberthreats Outside the Firewall

by Neustar Engineering August 20th, 2015

When most people think of cybersecurity, they think about passwords, firewalls, and hackers. But security vulnerabilities are not found exclusively in the cyber domain. Here is a list of ten current threats that can cause real damage to an organization’s bottom line, brand, and reputation—all of which exist outside of a company’s firewall. Read Full Article