.SPACE, one of the first new extensions to be released from by Radix last week reached its second year since launch. This post will provide you a short exclusive on how this new TLD has performed. more
The data reported here is from a wide-ranging survey, not from Neustar's network monitoring or DDoS mitigation efforts. The data reflects the realities faced by diverse IT professionals across numerous industries, among companies large and small. more
There are several directions an organization can take when naming critical digital properties. A classic tactic is using a common theme, such as pet names, planets, or colors. A CTO suggested naming database nodes after “Game of Thrones (GoT)” characters. Taking this route makes for an obscure naming system that would be difficult for third parties to guess. more
BlueCat Networks, the IPAM Intelligence company, today announced a new 5x7 standard Customer Care program to deliver five-hour on-site repair, seven days a week for its new lineup of IP Address Management (IPAM), DNS and DHCP hardware appliances. more
Of the many options to manage BYOD on the network, IT organizations tend to choose one of the following two approaches: they either enact a policy prohibiting the use of BYODs, or install local clients on each device to track and monitor BYOD behavior. Each of these approaches comes with its own pros and cons. more
Fake news and disinformation have been significant issues for some time now, even urging the U.S. government to push back against proliferators who, some opine, do the malicious deed for political or financial gain. Amid this scenario, many have begun doubting what's real and what's not on the Web not just in the U.S. but worldwide. more
Observers of the UDRP are aware that ICANN has substantially abrogated responsibility for oversight of the UDRP. ICANN accredits dispute resolution providers (DRPs) without requiring a contract so that the DRPs are held to no enforceable standards. more
The Anti-Phishing Working Group (APWG) has released its Global Phishing trends study for the first half of 2009 and .ORG, The Public Interest Registry (PIR), was highlighted for its leadership in significantly reducing online fraud. more
NeuStar Inc., which provides clearinghouse services to the Internet and communications industries, has acquired San Diego company Webmetrics Inc., which monitors and measures Web and network performance. more
NeuStar Partners With MegaFon to Deliver Russia's Third Mobile Instant Messaging ServiceNeuStar today announced that MegaFon, Russia's first all-Russian mobile operator in GSM 900/1800 standard, has selected NeuStar to launch its new Instant Messaging (IM) service. more
The ability to retrieve historical WHOIS information can be essential for the cybersecurity community, particularly when it comes to threat hunting and cybercrime investigation. This investigative capability is highlighted in our latest downloadable white paper "Digging Up Zombie Domains: What WHOIS History Reveals about 3,800+ Verified Phishing Hosts" where we analyzed thousands of verified phishing hosts and their historical WHOIS records. more
NeuStar has announced that it has deployed network nodes in Sydney, Australia and Beijing, People's Republic of China, further expanding NeuStar's global constellation of DNS servers and enhancing the delivery of NeuStar UltraDNS services to the Asia-Pacific region. more
Kozow[.]com hosts the website of free dynamic Domain Name System (DNS) service provider Dynu Systems. It has been cited for ties to several malicious activities over the past few months. To see if it would be a good idea for organizations to consider blocking the domain from their networks, we collated a list of kozow[.]com subdomains and subjected them to deeper scrutiny. more
What keeps CISOs up at night? For hundreds of senior company leaders across countries and industries, the steady growth of cybercrime is one of their biggest concerns. Consequently, organizations spend more money than ever to mitigate the risks and consequences of data breaches, despite a new wave of attacks being on its way as we speak. more
Recent years have brought a plague of attacks targeting your ability to do business online. Whether in the form of distributed denial of service attack (DDoS), spam, phishing, or Facebook and Twitter scams. Likely the most disturbing issue for e-commerce organizations has been the growing prevalence of DDoS attacks waged to interrupt their business, or worse, to extort money. more
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byRadix
Sponsored byDNIB.com
Sponsored byCSC
Sponsored byWhoisXML API
Sponsored byVerisign