Afilias, a global provider of Internet infrastructure services, today announced that it has enabled Domain Name System Security Extensions (DNSSEC) for .GI, the country code Top Level Domain (ccTLD) for Gibraltar, .MN for Mongolia, and .SC for the Seychelles. more
In both 2011 and 2012, Neustar reported on the DDoS attack landscape in North America. This year, it also surveyed IT pros in the United Kingdom on the growth of attacks and their impact in 2012, as well as the types of DDoS protection organizations use. more
Threat intelligence is the cornerstone of a mature cybersecurity plan. Staying abreast of the emerging threats and knowing where and when your adversaries are about to strike is a crucial aspect in building organizational cyber defenses. more
On October 8th, New York City gave its residents their own web address, opening public access to .nyc. The new top-level domain is open to any business, organization or person with a physical address in the Big Apple. more
As more people are realizing that in today's cyber climate Distributed Denial of Service (DDoS) attacks are a matter of when, not if, the most common question I get asked is "What can I do to prepare?" I like to break it down into 5 key steps enterprises can take now to be prepared for a future attack... It would take a book to cover all of these topics in depth. Hopefully this will at least give you, some things to think about and plan for with your DDoS mitigation strategy. more
Know-your-customers (KYC) policies aim to minimize the risk of money laundering, bribery, and other types of fraud. While it was originally implemented in financial institutions, companies outside the financial sector have adapted KYC with digital transactions as the primary driver. These days, the approach is enforced by virtual asset dealers, nonprofit organizations, and even social media companies. more
The Registry for .PW today announced that the Sunrise Period will be extended for a week, until 15th February, 2013. Sunrise was originally scheduled to end on 8th February and has been extended further based on the late interest from brand owners. more
dotStrategy, Co. the operator of the new Top Level Domain .BUZZ, announced today it has selected Neustar's Registry Threat Mitigation Services to support and protect the .BUZZ registry. more
Joining the likes of Cisco, Google, Yahoo, and other industry leaders, Verisign enables global IPv6 connectivity to its corporate website on June 8 - to mark World IPv6 Day - and thereafter, so that anyone with IPv6 Internet capabilities will be able to access the site. more
In the past, security experts typically made a distinction between a cybercrime and an advanced persistent threat (APT). While cybercrime focused on obtaining financial gain, APTs trailed their sights on specific organizations, often to steal nation-state secrets. more
The new node - the third in Europe along with London and Luxembourg - will further increase the reliability and performance of the UltraDNS Managed DNS Service, especially for end users in Europe who will experience even faster resolution times for domains hosted on UltraDNS infrastructure. more
Neustar announces the launch of Neustar Professional Services with a comprehensive suite of IT service offerings for enterprise organizations of all sizes. Neustar's seasoned team of professionals provides the expertise and resources organizations need to ensure the performance, security and reliability of their IT infrastructure. more
This brings to 17 the number of top-level domains that Afilias supports, including seven generic TLDs (gTLD) operating under ICANN contracts and seven new TLDs launched since 2001. more
Leading provider of global on-demand, network and endpoint IT security solutions for email, enterprise networks and the Web, has selected NeuStar's Managed External DNS to strengthen its security, compliance and productivity offerings. more
Reverse domain name hijacking is a shady practice that some individuals and organizations carry out. It occurs when a trademark owner makes false claims in an attempt to gain control of a domain that someone else owns. more
Sponsored byRadix
Sponsored byCSC
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byIPv4.Global
Sponsored byVerisign