Neustar Engineering

Neustar's Articles

Ten Cyber Threats Outside the Firewall

August 20th, 2015

When most people think of cyber security, they think about passwords, firewalls, and hackers. But security vulnerabilities are not found exclusively in the cyber domain. Here is a list of ten current threats that can cause real damage to an organization’s bottom line, brand, and reputation—all of which exist outside of a company’s firewall. Read Full Article


How to Weather a DDoS Storm

July 13th, 2015

Most IT departments have some kind of disaster recovery plan that includes reacting to natural events such as earthquakes, tornadoes, fire, or floods. But one disaster that’s far more likely to occur is manmade: a flood of bogus DDoS packets that can cripple your network infrastructure. Given its likelihood, IT administrators should seriously consider DDoS attacks in their disaster recovery plan. Read Full Article


Press X to DDoS (part 2)

April 27th, 2015

DDoS is more than a nuisance for the provider of the gaming platform. The entire business hangs in the balance. DDoS can make the platform unavailable to all users. Revenue, user experience and brand reputation are all at stake. This is second in a two-part series on DDoS attacks on the gaming industry. This blog post will discuss how gaming platforms and gamers can protect themselves from DDoS attacks. Read Full Article


Press X to DDoS (part 1)

April 19th, 2015

Every day millions of people play online video games. The tools of the trade are mostly familiar (controller, console, flat screen), but for some, they also include distributed denial-of-service (DDoS) attack tools to take their opponents offline or disrupt the platform itself. This is first in a two-part series on DDoS attacks on the gaming industry. This blog post is an overview of these attacks on the industry as a whole. Read Full Article