Industry

Latest

Common Threats That Can Be Overcome by Email Verification

One of the most effective and prevalent ways to reach someone in today's business world remains email. With billions of users worldwide, it is the backbone of business communications. more

How IP Netblocks Data Can Enrich SIEM Software

There's no denying the fact that many enterprises worldwide use security information and event management (SIEM) software. These products collect, analyze, and create reports on cybersecurity data from the range of systems an organization uses. Some SIEM programs are even capable of stopping attacks in progress as soon as these are detected. more

Domain & IP Intelligence: An Advantage to Managed Detection and Response

Outsourcing may not always have had the best connotation. In the context of cybersecurity, however, the activity is a vital one and often even the only real alternative for many small- and medium-sized organizations. more

Afilias Thanks Desiree Miloshevic for 12 Years of Service to ISOC

Afilias, the world's second largest domain name registry, today thanks Desiree Z. Miloshevic for her leadership and service to the Board of Trustees of the Internet Society. more

How to Address Blended Threats with Domain Data

Fighting off individual threats is challenging enough, but things get complicated, and the results more damaging when organizations face blended threats. The practice of combining security threats such as malware and attack vectors confounds if not overwhelms victims, making them easy prey. more

Website Categorization: Enhancing URL Filtering for MSSPs

Although the Internet offers many opportunities, it also comes with a wide variety of issues. Cybercrime is rampant, and not knowing how to navigate the Web safely can lead to severe consequences. Phishing is one of the top concerns for enterprises. And managed security service providers (MSSPs) have decided that URL filtering is one way to resolve the issue. more

Should Cybersecurity Teams Consider Next-Generation Firewalls?

Cyber attacks and hacking methodologies are growing in complexity over time. This concern has led many enterprises to look toward more advanced capabilities to enhance their cybersecurity. One solution they have found is utilizing next-generation firewalls. more

How Website Categorization Technology Can Assist MDR Teams

The threat landscape is more complicated than it was before. Many organizations are thus starting to weigh their options on how to protect their data best. Amid the persistent cybersecurity skills shortage, companies are wondering if they should turn to outsourced services. more

DeviceAssure Wins Award for Mobile Innovation at IHS Showstoppers

The IHS Markit Innovation Awards recognizes innovative products from companies exhibiting at ShowStoppers at IFA in Berlin. IHS Markit is a world leader in critical information, analytics and business solutions for major industries and markets, helping drive economies worldwide. more

101domain Expands Security Offering to Include Nearly Two Dozen New SSL Certificate Solutions

101domain has added nearly two dozen new SSL Certificates powered by Sectigo, the world's largest certificate authority. Partnering with a reputable certificate authority is just as important as selecting the right kind of certificate. more

Can Website Categorization Support Fraud Monitoring?

Detecting and preventing fraud have become in-demand over the years. As such, expectations from fraud solution providers have gone up as well. more

How Domain Data Can Enrich an MSSP's Threat Intelligence

Outsourcing security monitoring and management has become a practical option for organizations that lack the budget to take care of their own threat detection and incident response needs. As such, small and medium-sized businesses (SMBs) are turning to external security providers. more

Topics

IP Addressing

Sponsored byAvenue4 LLC

New TLDs

Sponsored byAfilias

Domain Names

Sponsored byVerisign

Whois

Sponsored byWhoisXML API

DNS Security

Sponsored byAfilias

Cybercrime

Sponsored byThreat Intelligence Platform

Cybersecurity

Sponsored byVerisign

Most Viewed – Last 30 Days