Cybersecurity

Sponsored
by

Cybersecurity / Industry Updates

How Domain Data Can Enrich an MSSP’s Threat Intelligence

Outsourcing security monitoring and management has become a practical option for organizations that lack the budget to take care of their own threat detection and incident response needs. As such, small and medium-sized businesses (SMBs) are turning to external security providers. more

Using Domain Name Intelligence to Counter E-Commerce Platform Vulnerability Exploit Attacks

In 2018, e-commerce sites proved to be a favored cyberattack target. This trend remains constant this year, as online shops continued to be red-flagged and blacklisted by cybersecurity companies. more

4 Cybersecurity Professionals That Can Benefit from Threat Intelligence

There is a misconception that threat intelligence is something that only specialists in the cybersecurity field can analyze and understand. In truth, threat intelligence is a good resource that can be of use in any cybersecurity role. It is something that anyone who cares about or works toward network security will find beneficial. more

How Threat Intelligence Can Solve 3 Common SIEM Problems

Security information and event management (SIEM) solutions are an excellent way to get incident data from an organization's network and put them all in one place. But as a network's complexity grows, so do the problems these SIEM vendors face with regard to providing the right products to clients. more

The Growing Need for Managed Detection and Response Services

A recent prediction from Cybersecurity Ventures states that the cybersecurity sector is going to have as many as 3.5 million unfilled positions by the year 2021. That is why managed detection and response (MDR) services are now more important than ever. more

Fraud Protection Measures Against Malicious New Domains

Many domain names are registered each day and so become part of the Domain Name System (DNS). In fact, research shows that at least two new registrations are seen per second. Although most of these are done for commercial and other legitimate purposes, not everyone who registers a domain has good intentions. more

How SIEM Vendors Can Reduce False Positives from Their Products

Organizations operating a security information and event management (SIEM) solution are struggling with one of the biggest problems in cybersecurity today: false positives. more

New Phishing Tools Can Now Bypass 2-Factor Authentication

Two-factor authentication (2FA) is an essential safety measure that stops unauthorized access to an account. It was invented to provide an additional layer of security to the usual log-in procedure of providing one's username and password, which is now considered by many as obsolete and unsecured. more

DIY Threat Intelligence Gathering If Your Security Solutions Seem Lacking

Security solutions are not made equal. Some are better than others when it comes to providing overall protection, but most will require you to buy an entire suite that's enough to break the bank just so you'd feel safe from cyber attacks. So what are you to do if your budget just isn't big enough to afford all-around protection? more

NS1 and Salesforce Collaborate on Multi-Signer DNSSEC Implementation

NS1 today announced it collaborated with experts from Salesforce on the first implementation of multi-signer DNSSEC, which enables the cryptographic signing of DNS records across zones with multiple DNS platforms. more