Brand Protection

Sponsored
by

Noteworthy

Brand Protection / Recently Commented

U.S. National Cybersecurity Strategy and Its Impact on Domain Security

Last month, the U.S. National Cybersecurity Strategy was launched, providing a new roadmap for stronger collaboration between those operating within the digital ecosystem. The strategy calls on software makers and American industry to take far greater responsibility to assure that their systems cannot be hacked while accelerating efforts by the Federal Bureau of Investigation and the Defense Department to disrupt the activities of hackers and ransomware groups around the world. more

Brand Impersonation Online is a Multidimensional Cybersecurity Threat

Brand impersonation happens much more often than people realize. In CSC's latest Domain Security Report, we found that 75% of domains for the Global 2000 that contained more than six characters from the brand names were not actually owned by the brands themselves. The intent of these fake domain registrations is to leverage the trust placed on the targeted brands to launch phishing attacks, other forms of digital brand abuse, or IP infringement... more

Patterns and Trends in Domain Tasting of the Top 10 Global Brands

Domain tasting is a long-established practice involving the short-lived existence of a domain, which is allowed to lapse a few days after its initial registration. The practice arose in response to an Internet Corporation for Assigned Names and Numbers (ICANN) policy allowing a domain to be cancelled -- with all fees refunded -- within a five-day grace period, intended to address the issue of accidental registrations1. However, the practice is open to abuse by infringers. more

Amazon Gets FCC Approval to Deploy Its Project Kuiper Broadband Satellites

Today, the FCC has sided with Amazon in a regulatory battle over Project Kuiper, the company's satellite internet system. Despite objections from rival SpaceX, the commission has approved Amazon's plan to prevent the upcoming satellite internet constellation from causing orbital debris in space. more

Competing Against Big Cable Companies

I'm asked at least twenty times a year how a small ISP can compete against the big cable companies. The question comes from several sources - a newly-formed ISP that is nervous about competing against a giant company, a rural ISP that is entering a larger market to compete, or investors thinking of funding a new ISP. These folks are rightfully nervous about competing against the big cable companies. more

Blockchain Domains and What They Could Mean for Online Scams and Brand Protection

Blockchain domain names, domains that are stored on blockchain or cryptocurrency exchanges, are part of a growing, unregulated, and decentralized internet. Right now, blockchain domains are used mostly by cryptocurrency users, but they are growing in popularity - the Ethereum name service reported over 2.2 million .eth domain name registrations in 2022. At the same time, crypto scams are also exploding, reaching a total of $3.5 billion in losses in 2022. more

The Highest Threat TLDs - Part 2

In the first article of this two-part blog series, we looked at how frequently domains were used by bad actors for phishing activity across individual top-level domains (TLDs) or domain extensions, using data from CSC's Fraud Protection services, powered by our DomainSecSM platform. In this second article, we analyze multiple datasets to determine the highest-threat TLDs, based on the frequency with which the domains are used egregiously for a range of cybercrimes. more

2023 Review of the Online Brand Protection Market

Having been involved in this sector for over fifteen years now, the rate of change in the market dynamics continues to surprise me - from its early years when MarkMonitor and NetNames clearly led the space for several years, then seeing well-funded startups such as Yellow Brand Protection and Incopro challenge that, followed by a period of heavy M&A, it is now extremely diverse. more

Space Weather and Broadband

There was an interesting phenomenon that happened in September when Starlink launched 49 new satellites. The satellites were successfully deployed by the rocket, but as the satellites were being maneuvered to reach the final orbital slots, there was a geomagnetic storm that caused 38 of the satellites to fall back to earth. Space storms happen when radiation affects the magnetosphere that surrounds the earth.  more

Cuban Undersea Cable Politics

Undersea cables between the U. S. and Cuba have long been intertwined with politics. In 1887, The New York Times reported on the inauguration of a cable in support of the Cuban insurgents fighting for independence from Spain -- a precursor to the Spanish-American war. Phone service between the U.S. and Cuba began in 1921 with AT&T's installation of an undersea cable and AT&T dominated international telephony to Cuba until the 1990s. more

A New Definition of 6G

We now know how wireless carriers are going to continue the string of new G generations of cellular technology. 5G was originally defined to include spectrum up to 90 GHz or 100 GHz. In the last few years, international standards bodies have been developing new 6G standards in what is called the terahertz wavelengths between 100 GHz and 1 THz. more

How Safe Are Your .KIDS?

This year has been one of the busiest years for domain launches in quite a while. Before the end of 2022, we'll see one more significant domain launch, namely .KIDS, on November 29, 2022. This extension is being launched as a safe space on the internet for children and parents. The registry has set out some very strict use policies to make this happen. Some companies have already registered their brands during the Sunrise Period, while others have taken up names in the Community Sunrise. more

Three Reasons Why CISOs Need to Understand Domain Security

Domain name abuse is one of the most dangerous and under-regulated issues in digital business security today. An attack on a web domain can lead to the redirection of a company's website, domain spoofing, phishing attacks, network breaches, and business email compromise (BEC). Domains used as a company's online world are part of an organization's external attack surface and need to be continuously monitored for cybercrime attacks and fraud. more

How Are You Solving the Digital Divide

One of the most common questions I'm being asked these days is from local politicians and economic development folks who want examples of other communities that are tackling and solving the digital divide. I'm able to trot out the big-picture stories because they come to my attention in reading about the industry. As an example, just before I wrote this blog, I read an article that says that the State of Maryland will be providing 150,000 laptops to homes... more

Economy-of-Scale for ISPs

I've worked with a number of small communities that want to explore the idea of having a community-owned ISP. My advice to small communities is the same as with all clients - economy-of-scale really matters for ISPs. Economy-of-scale is the economic term for describing how businesses get more efficient as they get larger. It's fairly easy to understand, and the classic example is to look at the impact of the salary and costs of the general manager of an ISP.  more