Security

Noteworthy

 IPv6 represents new territory for most Internet stakeholders, and its rollout will introduce some unique security challenges.

Security / Industry Updates

MarkMonitor Partners with CYREN to Deepen Visibility into Global Phishing Attacks

The partnership will further advance fraud detection capabilities by improving visibility into phishing and other malicious attacks on a global scale by incorporating CYREN technology into the company's anti-fraud services. more»

Verisign Named to the Online Trust Alliance's 2016 Honor Roll

Verisign is pleased to announce that it has qualified for the Online Trust Alliance's (OTA) 2016 Honor Roll for showing a commitment to best practices in security, privacy and consumer protection. more»

Verisign Q1 2016 DDoS Trends: Attack Activity Increases 111 Percent Year Over Year

Verisign today released its Q1 2016 DDoS Trends Report, which provides a unique view into online distributed denial of service (DDoS) attack trends from mitigations enacted on behalf of customers of Verisign DDoS Protection Services and research conducted by Verisign iDefense Security Intelligence Services. more»

Is Your TLD Threat Mitigation Strategy up to Scratch?

When it comes to operating a TLD, ensuring your namespace is free of malicious activity should be a particular area of focus if you would like to maintain your reputation as a trusted destination online. Equally, this is a topic of increasing importance for ICANN who continue to drive TLDs to provide safer and safer namespaces. more»

i2Coalition to Host First Ever Smarter Internet Forum

The i2Coalition has announced that it will be holding its first Smarter Internet Forum June 14th through 15th 2016 at Sheraton Downtown Philadelphia Hotel in Philadelphia, Pennsylvania. more»

Encrypting Inbound and Outbound Email Connections with PowerMTA

Encryption is becoming increasingly necessary when transferring data across the internet, and email is no different. In PowerMTA 4.5 and later there are several methods to encrypt both inbound and outbound connections. Here we'll provide a quick overview of how they may be achieved. Keep in mind, this document only deals with encrypting the channel, not the content. more»

Resilient Cybersecurity: Dealing with On-Premise, Cloud-Based and Hybrid Security Complexities

Having a tightly integrated security framework is more critical than ever as cyber-attacks grow and enterprises employ a variety of on-premise and cloud-based computing services to deliver applications. more»

Verisign Releases Q4 2015 DDoS Trends - DDoS Attack Activity Increasing by 85% Year Over Year

Verisign has just released its Q4 2015 DDoS Trends Report, which provides a unique view into online distributed denial of service (DDoS) attack trends from mitigations enacted on behalf of customers of Verisign DDoS Protection Services and research conducted by Verisign iDefense Security Intelligence Services. more»

Best Practices from Verizon - Proactively Mitigating Emerging Fraudulent Activities

On Wednesday, February 24, we hosted a webinar - Best Practices from Verizon, Proactively Mitigating Emerging Fraudulent Activities - with Patrick Flaherty, Assistant General Counsel for Marketing, IP & New Media Law & Policy at Verizon. more»

Neustar Data Identifies Most Popular Times of Year for DDoS Attacks in 2015

Neustar today released preliminary data indicating April, February, October and December as the most popular months for DDoS attacks. The report, compiled from 2015 data from Neustar's Security Operations Center (SOC), also details the rising threat of multi-vector attacks. more»