Security

Noteworthy

 IPv6 represents new territory for most Internet stakeholders, and its rollout will introduce some unique security challenges.

Security / Industry Updates

Encrypting Inbound and Outbound Email Connections with PowerMTA

Encryption is becoming increasingly necessary when transferring data across the internet, and email is no different. In PowerMTA 4.5 and later there are several methods to encrypt both inbound and outbound connections. Here we'll provide a quick overview of how they may be achieved. Keep in mind, this document only deals with encrypting the channel, not the content. more»

Resilient Cybersecurity: Dealing with On-Premise, Cloud-Based and Hybrid Security Complexities

Having a tightly integrated security framework is more critical than ever as cyber-attacks grow and enterprises employ a variety of on-premise and cloud-based computing services to deliver applications. more»

Verisign Releases Q4 2015 DDoS Trends - DDoS Attack Activity Increasing by 85% Year Over Year

Verisign has just released its Q4 2015 DDoS Trends Report, which provides a unique view into online distributed denial of service (DDoS) attack trends from mitigations enacted on behalf of customers of Verisign DDoS Protection Services and research conducted by Verisign iDefense Security Intelligence Services. more»

Best Practices from Verizon - Proactively Mitigating Emerging Fraudulent Activities

On Wednesday, February 24, we hosted a webinar - Best Practices from Verizon, Proactively Mitigating Emerging Fraudulent Activities - with Patrick Flaherty, Assistant General Counsel for Marketing, IP & New Media Law & Policy at Verizon. more»

Neustar Data Identifies Most Popular Times of Year for DDoS Attacks in 2015

Neustar today released preliminary data indicating April, February, October and December as the most popular months for DDoS attacks. The report, compiled from 2015 data from Neustar's Security Operations Center (SOC), also details the rising threat of multi-vector attacks. more»

The Framework for Resilient Cybersecurity (Webinar)

A shift in security architecture is needed, to an open platform where devices and services from different vendors can share, and act, on threat intelligence information, all in concert and in the proper context. Join Ramakant Pandrangi, Vice President of Technology, and learn how to assist with designing a resilient security ecosystem by maximizing an API-centric approach. more»

Data Volumes and Network Stress to Be Top IoT Concerns

A new research commissioned by Neustar on many guises of the Internet of Things (IoT) reveals that despite being the topic du jour of 2015, IT departments' No. 1 concern is that the resulting explosion in data volumes will start to overwhelm their networks in 2016, leading to security concerns around keeping all the extra data safe. more»

DKIM for ESPs: The Struggle of Living Up to the Ideal

Given the increase in email fraud (phishing) and an increasingly complex email landscape, it is increasingly important for email service providers to implement email authentication properly. more»

Verisign Mitigates More Attack Activity in Q3 2015 Than Any Other Quarter During Last Two Years

As part of our efforts to support National Cyber Security Awareness Month by sharing the latest cybersecurity research, Verisign released its Q3 2015 DDoS Trends Report, which represents a unique view into attack trends unfolding online for the previous quarter. more»

Verisign & Forrester Webinar: Defending Against Cyber Threats in Complex Hybrid-Cloud Environments

Attend to learn some of the new tools and techniques to secure availability of applications in hybrid-cloud environments. more»