Brand Protection

Sponsored
by

Noteworthy

Domain Registrar Selection: A Key Indicator of Overall Organization Security

Is Your Domain Name Portfolio Governance Policy Up To Date?

Where Domain Security Meets the Supply Chain Crunch

Brand Protection / Featured Blogs

Have You Reviewed Your Domain Lock Portfolio?

Domain names give your intellectual property visibility, as well as provide function for your company's infrastructure. Vital domain names are simply too important to be left exposed. To protect them, you can add extra layers of security to your digital brand with easy, secure, server-level protection in addition to multi-level locks that combat domain name system (DNS) hijacking and protect against unauthorized changes and deletions to your critical domain names. more

Three Reasons Why CISOs Need to Know How Their Company Is Managing Their Domains

Companies today manage hundreds or even thousands of domain names that support their organization, their visitors from different countries, and their brands and trademarks. They register misspelling of their names as a defensive strategy to protect their brand from online fraud, or from losing traffic to simple user typos. more

An Overview of the Concept and Use of Domain-Name Entropy

In this article, I present an overview of a series of 'proof-of-concept' studies looking at the application of domain-name entropy as a means of clustering together related domain registrations, and serving as an input into potential metrics to determine the likely level of threat which may be posed by a domain. more

.AI You Ready? A Domain to Add to Your Portfolio… Before Someone Else Does

On the sunny beaches of Anguilla -- a small island of just 35 square miles -- I'm sure artificial intelligence (AI) is the last thing people are thinking about. The primary industries of Anguilla, set in the Leeward islands in the Caribbean, are tourism and offshore banking. However, this nation has been assigned the country code top-level domain (ccTLD) .AI -- which is being repurposed to represent artificial intelligence. more

How to Protect Your Brand in Web3

In 2014, computer scientist Gavin Wood coined the term "Web 3.0." The phrase, which has now been shortened to "Web3", refers to the third generation of the internet that's designed to be truly decentralised and free from a central authority. Web3 has the potential to add real-world value for businesses by creating additional avenues to reach consumers. However, owing to its less regulated nature, brands also have the potential to be taken advantage of both by users and by the providers in the space. more

Canadian International Pharmacy Association Celebrates 20 Years on the Internet

The Canadian International Pharmacy Association (CIPA) recently achieved a major milestone: We celebrated our 20-year anniversary, serving millions of customers around the world who otherwise would not afford, access or trust ordering their daily maintenance medications where they live. Founded in 2002 by a group of Canadian pharmacists who recognized the potential of the Internet to provide safe and affordable access to medications... more

The ‘Millennium Problems’ in Brand Protection

As the brand protection industry approaches a quarter of a century in age, following the founding of pioneers Envisional and MarkMonitor in 1999, I present an overview of some of the main outstanding issues which are frequently unaddressed or are generally only partially solved by brand protection service providers. I term these the 'Millennium Problems' in reference to the set of unsolved mathematical problems published in 2000 by the Clay Mathematics Institute, and for which significant prizes were offered for solutions. more

How You Can Be Hijacked Without Actually Being Hacked

Unsuspecting website visitors are often unaware when they have landed on a spoofed page or are re-directed to malware-hosting web servers designed to steal their sensitive data and information. This attack is known as subdomain hijacking, or subdomain takeover. A web user's private information is then traded on the dark web, and cybercriminals profit, further fueling the expansion of identity theft in the online world. more

Risk vs Benefit: The Impact of Shorter 90-Day SSL Certificate Life Cycles

In today's digital age, securing your website and ensuring your users' safety has never been more critical. Secure sockets layer (SSL) certificates are the go-to solution for securing websites by encrypting the data transmitted between web servers and browsers. Historically, SSL digital certificates could be valid for years, after which they had to be renewed or replaced.  more

U.S. National Cybersecurity Strategy and Its Impact on Domain Security

Last month, the U.S. National Cybersecurity Strategy was launched, providing a new roadmap for stronger collaboration between those operating within the digital ecosystem. The strategy calls on software makers and American industry to take far greater responsibility to assure that their systems cannot be hacked while accelerating efforts by the Federal Bureau of Investigation and the Defense Department to disrupt the activities of hackers and ransomware groups around the world. more

Industry Updates

What’s Your .AI Domain Strategy?

New CSC Research Indicates Launch of Threads by Instagram is Already a Growing Target for Fraud and Brand Abuse

AI Tool Popularity: An Opportunity for Launching Malicious Campaigns?

CSC Launches Groundbreaking Domaincasting Digital Blocking Network

Alleviating the Risks .zip and Similar Domain Extensions Could Pose via DNS Intelligence

New Global Initiative Aims to Strengthen Online Brand Protection

When Marketing Vendors Get Attacked, Clients Suffer: Third-Party Risk Discovery in the DNS

Dissecting 1M+ Malicious Domains Under the DNS Lens

Subdomain Hijacking Vulnerabilities Report: One in Five DNS Records Are Left in a State in Which They Are Vulnerable to Subdomain Hijacking

2023 Update - How Are the Most-Spoofed Brands Represented in the DNS?

Shining the WHOIS and DNS Spotlight on International Fraud

Gauging How Big a Threat Gigabud RAT Is Through an IoC List Expansion Analysis

Catching Batloader Disguised as Legit Tools through Threat Vector Identification

Tracing Connections to Rogue Software Spread through Google Search Ads

Sifting for Digital Breadcrumbs Related to the Latest Zoom Attack