Malware

Malware / Industry Updates

Resilient Cybersecurity: Dealing with On-Premise, Cloud-Based and Hybrid Security Complexities

Having a tightly integrated security framework is more critical than ever as cyber-attacks grow and enterprises employ a variety of on-premise and cloud-based computing services to deliver applications.

The Framework for Resilient Cybersecurity (Webinar)

A shift in security architecture is needed, to an open platform where devices and services from different vendors can share, and act, on threat intelligence information, all in concert and in the proper context. Join Ramakant Pandrangi, Vice President of Technology, and learn how to assist with designing a resilient security ecosystem by maximizing an API-centric approach.

Protect Your Network From BYOD Malware Threats With The Verisign DNS Firewall

Of the many options to manage BYOD on the network, IT organizations tend to choose one of the following two approaches: they either enact a policy prohibiting the use of BYODs, or install local clients on each device to track and monitor BYOD behavior. Each of these approaches comes with its own pros and cons.

Introducing the Verisign DNS Firewall

Verisign DNS Firewall is an easy-to-configure, cost effective managed cloud-based service that offers robust protection from unwanted content, malware and advanced persistent threats (APTs), delivered with the ability to customize filtering to suit an organization's unique needs.

TLD Security, Spec 11 and Business Implications

After successfully securing your new TLD, launching it, and executing on your meticulously devised marketing plan, the only other concern you face is Security. Unfortunately, predicting exactly when and to what degree a security threat will occur can be difficult but you can take steps to make your new TLD a source of legitimacy and credibility.

Verisign iDefense 2015 Cyber-Threats and Trends

Here is an overview of the key cyber security trends we expect to see in 2015. The majority of this year's threats and trends reflect research on iDefense's core focus areas of cyber-crime, cyber espionage and hacktivism.

Smokescreening: Data Theft Makes DDoS More Dangerous

It's called "smokescreening" and it's costing companies big. In 2013, over 50 percent of companies hit by DDoS attacks suffered theft of funds, customer data or intellectual property.

Our New Initiatives To Combat Botnets

We often throw around the term "bots" in our industry. Short for "robots," it's the common term for software programs that run automated tasks. In many cases, bots can be innocuous and even useful.

The State of Phishing

Over the last three years, the Anti-Phishing Working Group's semiannual Global Phishing Survey has become a widely cited source of information about the state of phishing and its place in the Internet landscape. Afilias' Director of Domain Security, Greg Aaron, has been co-authoring these reports with Rod Rasmussen of Internet Identity, with the goal to show the community what phishers are doing and how anti-abuse measures are effective.

ICANN and Cybersecurity: Hot Topics at The First Ever .ORG Forum

As we head into 2010, it's no secret that the issues of security and the prevention of internet identity theft in all its forms are of critical importance. .ORG, the Public Interest Registry, was honored to host the First .ORG Forum in Washington, D.C.