Cyberattack

Cyberattack / Industry Updates

Smokescreening: Data Theft Makes DDoS More Dangerous

It's called "smokescreening" and it's costing companies big. In 2013, over 50 percent of companies hit by DDoS attacks suffered theft of funds, customer data or intellectual property.

Is Your Organization Prepared for a Cyberattack?

Infamous heavyweight boxer Mike Tyson once said "everyone has a plan until they get punched in the face." As any organization that has faced a cyber attack will tell you, it is a lot like getting punched in the face, and if you're not ready, you might get knocked out. You've likely read recent headlines of major retailers, financial institutions, and now even universities, being hit with data breaches. As some of them have learned the hard way, it's not a question of if your organization will be attacked; it's a question of when.

What Does a DDoS Attack Look Like? (Watch First 3 Minutes of an Actual Attack)

This video visualization, filmed in Neustar's Security Operations Center, shows the first three minutes of an actual DDoS attack on a company's Transmission Control Protocol Synchronize (TCP SYN) authentication.

Joining Forces to Advance Protection Against Growing Diversity of DDoS Attacks

At Verisign, we focus on protecting companies from increasingly complex cyber threats, and this relationship should only raise the bar higher, as it will provide a different, more integrated approach than what's used today, to help ensure faster and more efficient detection and mitigation.

Why Managed DNS Means Secure DNS

The current DNS protocol, "if my packets don't get through I'll just retransmit them and they're not critical" will no longer cut it in today's ever-changing security landscape.

5 Steps to Prepare for a DDOS Attack

As more people are realizing that in today's cyber climate Distributed Denial of Service (DDoS) attacks are a matter of when, not if, the most common question I get asked is "What can I do to prepare?" I like to break it down into 5 key steps enterprises can take now to be prepared for a future attack... It would take a book to cover all of these topics in depth. Hopefully this will at least give you, some things to think about and plan for with your DDoS mitigation strategy.

DDoS Attacks in the United Kingdom: 2012 Annual Trends and Impact Survey

In both 2011 and 2012, Neustar reported on the DDoS attack landscape in North America. This year, it also surveyed IT pros in the United Kingdom on the growth of attacks and their impact in 2012, as well as the types of DDoS protection organizations use.

Hope is Not a Strategy: Neustar Releases 2012 Annual DDoS Attack and Impact Survey

The data reported here is from a wide-ranging survey, not from Neustar's network monitoring or DDoS mitigation efforts. The data reflects the realities faced by diverse IT professionals across numerous industries, among companies large and small.

How Neustar Technology Can Help Mitigate DDoS Attacks

Learn about the diverse technologies Neustar uses to Mitigate DDoS attacks quickly and effectively. The seasoned DDoS fighters in the Neustar Security Operations Center explain the need for a full toolset to combat complex attacks.

Recent Trends and Options to Mitigate DDoS Attacks (Webcast)

This Monday, December 3, Neustar will hold a webcast to review recent trends in attacks and the most popular methods of mitigation. During the 60 minute webcast, recent attacks will be analyzed as well as implications they have had on DDoS mitigation solutions.