Neustar Engineering

Neustar's Articles

Just Enough Is Good Enough: The Profile of Multi-vector Attacks

February 29th, 2016

During RSA Conference 2016, Neustar will preview some findings from our upcoming Security Operations Center (SOC) Report. The report chronicles attacks that the Neustar SOC team spotted and mitigated in 2015. As part of a three-part series covering different aspects of the SOC findings, this blog post profiles multi-vector attacks, a troubling trend on the rise. Read Full Article


Opportunists in the Woodwork: Security Exploits on the Internet of Things

February 17th, 2016

It is estimated that there will be some 212 billion IoT devices by the year 2020. The unfortunate reality is that with every great technological shift, there will be new avenues for abuse, theft, and mischief. In fact, there are new exploits that are already impacting the Internet of Things and shaping the strategies of cyber attacks against it. Read Full Article


Ten Cyber Threats Outside the Firewall

August 20th, 2015

When most people think of cyber security, they think about passwords, firewalls, and hackers. But security vulnerabilities are not found exclusively in the cyber domain. Here is a list of ten current threats that can cause real damage to an organization’s bottom line, brand, and reputation—all of which exist outside of a company’s firewall. Read Full Article


How to Weather a DDoS Storm

July 13th, 2015

Most IT departments have some kind of disaster recovery plan that includes reacting to natural events such as earthquakes, tornadoes, fire, or floods. But one disaster that’s far more likely to occur is manmade: a flood of bogus DDoS packets that can cripple your network infrastructure. Given its likelihood, IT administrators should seriously consider DDoS attacks in their disaster recovery plan. Read Full Article


Press X to DDoS (part 2)

April 27th, 2015

DDoS is more than a nuisance for the provider of the gaming platform. The entire business hangs in the balance. DDoS can make the platform unavailable to all users. Revenue, user experience and brand reputation are all at stake. This is second in a two-part series on DDoS attacks on the gaming industry. This blog post will discuss how gaming platforms and gamers can protect themselves from DDoS attacks. Read Full Article