Cybersecurity

Sponsored
by

Cybersecurity / Industry Updates

3 Ways to Combat Phishing in 2019

Just when we thought that phishing has run out of its bag of tricks, hackers are changing their tactics. Whereas before the attacks could be generalized and random, this time, they are more targeted, tailored, and personal. What are crooks up to? more

How the Best IP Geolocation API Can Support Cybersecurity Efforts

Cybersecurity is pretty much a game of "hide and seek" - cybercriminals hide, cybersecurity teams seek -- and the damage is often based on how long the perpetrators are able to continue their attacks without being found. more

WHOIS History API: Powering Domain Investigations

The Internet is like a beach - you will most likely leave behind footprints while you are there. And these impressions can be traced back to whoever left them. The same is true with domain ownership. That website name you plan to launch your next venture on? Its domain may have a history of its own. more

The Era of Malware: 3 Techniques to Detect and Stay Protected

A while back, creating malicious software was sort of a hobby for programmers. It was hardly ever used to make money, but more of a way to show off what one can do with a computer. more

Domain Reputation API: Scoring High Points for Deliverability and Security

As scary as it may seem, everyone is a target on the Web. Worse, your susceptibility to cyber attacks, when not promptly addressed, marks you not just as a target but can even lead others to consider you as a threat. more

Neustar Research Shows Large Attacks Growing as Multi-Vector Exploits Increasingly Become the Norm

Neustar has released its Q1, 2019 Cyber Threats and Trends report which highlights new areas of growth in Distributed Denial of Service (DDoS) attacks over the past year. The report affirms that DDoS attacks continue to be an effective means to distract and confuse security teams while inflicting serious damage to brands. more

A Snapshot of the Fundamentals of Threat Hunting

Like it or not but the face of cybersecurity has changed over the past few years and while conventional approach has taken a back seat lately, non-traditional methods are coming to the rescue. more

Cybersecurity on the Clock: How to Run More Timely and Efficient Operations

A career as an information security analyst is one of the top technology jobs nowadays and for a good reason. Billions of dollars are spent every year to fight cybercrime, and companies are now willing to pay top rates for the best talent available. more

Afilias Joins Global Commission on the Stability of Cyberspace

The GCSC, setup in 2017, helps to promote the peaceful use of cyberspace to facilitate economic growth and the expansion of individual freedoms. more

i2Coalition Releases Statement On Australian Encryption Law Passing

On December 6th, the Australian Internet Parliament formally passed the "Assistance and Access Bill." This package includes a series of provisions which require tech firms to help the country's security agencies bypass encrypted communications in their systems. more