Cybersecurity

Sponsored
by

Cybersecurity / Industry Updates

DKIM for ESPs: The Struggle of Living Up to the Ideal

Given the increase in email fraud (phishing) and an increasingly complex email landscape, it is increasingly important for email service providers to implement email authentication properly.

Verisign Mitigates More Attack Activity in Q3 2015 Than Any Other Quarter During Last Two Years

As part of our efforts to support National Cyber Security Awareness Month by sharing the latest cybersecurity research, Verisign released its Q3 2015 DDoS Trends Report, which represents a unique view into attack trends unfolding online for the previous quarter.

Verisign & Forrester Webinar: Defending Against Cyber Threats in Complex Hybrid-Cloud Environments

Attend to learn some of the new tools and techniques to secure availability of applications in hybrid-cloud environments.

Introducing Verisign Public DNS: A Free Recursive DNS Service That Respects Your Privacy

If you are one of the 55 percent of individuals who are anxious about openly handing over your private information, what can you do? The first step is to determine your digital footprint.

Faster DDoS Mitigation - Introducing Verisign OpenHybrid Customer Activated Mitigation

In the recently published Forrester WAVE: DDoS Service Providers, Q3 2015 report, Forrester notes the importance of a hybrid approach to distributed denial of service (DDoS) protection.

Verisign’s Q2’15 DDoS Trends: DDoS for Bitcoin Increasingly Targets Financial Industry

Verisign just released its Q2 2015 DDoS Trends Report, which provides a unique view into online distributed denial of service (DDoS) attack trends from mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services and research conducted by Verisign iDefense Security Intelligence Services.

Protect Your Network From BYOD Malware Threats With The Verisign DNS Firewall

Of the many options to manage BYOD on the network, IT organizations tend to choose one of the following two approaches: they either enact a policy prohibiting the use of BYODs, or install local clients on each device to track and monitor BYOD behavior. Each of these approaches comes with its own pros and cons.

Announcing Verisign IntelGraph: Unprecedented Context for Cybersecurity Intelligence

With significant data breaches making headlines over the last six months, most notably the U.S. Government's Office of Personnel Management (OPM), organizations managing critical networks and data are watching their worst nightmares play out on a public stage.

Introducing the Verisign DNS Firewall

Verisign DNS Firewall is an easy-to-configure, cost effective managed cloud-based service that offers robust protection from unwanted content, malware and advanced persistent threats (APTs), delivered with the ability to customize filtering to suit an organization's unique needs.

TLD Security, Spec 11 and Business Implications

After successfully securing your new TLD, launching it, and executing on your meticulously devised marketing plan, the only other concern you face is Security. Unfortunately, predicting exactly when and to what degree a security threat will occur can be difficult but you can take steps to make your new TLD a source of legitimacy and credibility.