Industry

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

The Importance of Predictive Analytics and Machine Learning in Cybersecurity

Experts in the realm of cybersecurity are continually trying to keep up with the changes in the threat landscape. Even with advanced tools on hand, any IT security professional knows that a data breach can happen at any time. more

Procuring Digital Evidence for Reverse Domain Hijacking Case with Domain Research & Monitoring Tools

Reverse domain name hijacking is a shady practice that some individuals and organizations carry out. It occurs when a trademark owner makes false claims in an attempt to gain control of a domain that someone else owns. more

Is Blocking via IP Geolocation the Answer to Preventing DDoS Attacks?

If there's anything we learned about the threat landscape, it's that none of us are safe from malicious actors. Becoming a victim is not a matter of "if" but "when." Enterprises are now aware that the thought of being "too big to fail" is no longer applicable. more

Thoughts and Recommendations on Addressing Vulnerability Exploitation

Cybercriminals aren't always as creative as we think they are. There is a myth about them having a never-ending supply of techniques and tricks up their sleeves. However, many can't be considered as innovators in their shady field. more

Unraveling Unsolved Mysteries with Threat Intelligence

Have you ever heard of Lake City Quiet Pills? It refers to a mysterious site that first made waves on Reddit in 2009 and has since resurfaced. What Is Lake City Quiet Pills? more

Can IP Geolocation Contribute to Detecting Online Credit Card Fraud?

The problem of credit card fraud is not set to be resolved anytime soon. On the one hand, detecting and preventing the artifice is one of the most challenging aspects of e-commerce. more

IP Geolocation: Improving Data Loss Prevention in Virtual Environments through Geofencing

Each day, threat actors search for targets whose assets they can compromise for personal gain. Their attacks often use exploit kits that can find gaps in networks that they use to infiltrate and compromise vulnerable systems and applications. more

How Radix Is Helping Websites Stand Out With Meaningful, Descriptive Domains

Boasting more than 5 million domains under its management, Radix gives website owners and brands several vibrant, refreshing ways to craft an online presence. more

More than Ever: Why Organizations Need Proactive Defense in 2019

In the first half of 2019 alone, several data breaches have already exposed as many as 4.1 billion personal records. We've seen even industry giants and low-key players alike succumb to all kinds of data compromise. more

How to Stay Safe Against DNS-Based Attacks

The Domain Name System (DNS) plays an essential role in resolving IP addresses and hostnames. For organizations, it ensures that users reach the proper sites, servers, and applications. While it's a fundamental base for a functioning Web, the problem is that this system can easily be abused. more

Why Companies Should Strive to Stay on Google's Good Side

Imagine that your registrar informs you the domain you've been eyeing would soon become available for purchase. That's good news. However, your security adviser told you to make sure a domain is threat-free before you buy it. more

The More Threat Intelligence Integrated Into Security Solutions, the Better?

Today's sophisticated threats present enormous risks for any business. The more connected a company is, the more prone it is to cyber attacks. Enterprises need to devise ways to protect the integrity of their data and ensure that their systems are safe from cyberthreats. more

Do IP Geolocation Data Improve User Access Management (UAM)?

Some organizations have specific policies that limit employee access to information. However, not all have sophisticated security solutions in place to protect against unauthorized access, especially amid cyber attacks that occur left and right. more

NS1 Raises $33M for Its Application Traffic Management Solutions

The round was led by Dell Technologies Capital, with participation from Cisco Investments and existing investors Deutsche Telekom Capital Partners, EntrĂ©e Capital, Flybridge Capital Partners, GGV Capital, Mango Capital, Salesforce Ventures, Sigma Prime Ventures, Telstra Ventures, and Two Sigma Ventures. more

Radix Adds .UNO to Its Domain Portfolio

Radix, leading new domains registry with over 5M domains under management, has acquired .UNO, a top-level domain that was previously operated by Dot Latin LLC. The ownership transfer was completed in September 2019 and Radix now has exclusive rights to operate .UNO globally. more

Topics

IP Addressing

Sponsored byAvenue4 LLC

DNS Security

Sponsored byAfilias

Cybercrime

Sponsored byThreat Intelligence Platform

Whois

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byAfilias

Latest