Skip the navigation

Cybercrime and Hacking White Papers

Cybercrime and Hacking white papers and technology resources for implementing and optimizing Cybercrime and Hacking strategy, solutions, Cybercrime and Hacking products, and more.

Transforming Information Security: Future-Proofing Processes

The ad-hoc processes put in place for the days of perimeter-based security can't handle the scale and complexity of managing cybersecurity risks for a global enterprise today. This report provides a valuable set of recommendations from 19 of the world'd leading security officers to help organizations build security strategies for today's escalating threat landscape.

Sponsor: EMC Corporation


 

The Evolution of Corporate Cyberthreats

Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted to IT security, established businesses like yours are vulnerable to a wider array of attacks. To keep your organization safe, it's imperative to stay at least a few steps ahead of the bad guys.

Sponsor: Kaspersky


 

3 Questions to Ask Your DNS Host about Lowering DDoS Risks

It's no secret that DDoS attacks are worsening by the day. From the largest financial institutions to smaller Internet companies, everyone's a target. Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size. Most of these conversations boil down to three key questions and form the conversation you should be having, too-whether you use Neustar, another provider or your in-house team to manage your external DNS.

Sponsor: Neustar Inc.


 

The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report

DDoS attacks against high-tech firms have started to take a dangerous turn. It's called DDoS smokescreening - attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property. This is just one insight in Neustar's 2014 Annual DDoS Attacks and Impact Survey. The resulting report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology products and/or services such as software, SaaS, IaaS as well as hardware manufacturers

Sponsor: Neustar Inc.


 

DDoS Infographic: How Are Attacks Evolving?

For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger? What new tactics are criminals employing? See this infographic for clues.

Sponsor: Neustar Inc.


 

Three Ways Your DNS Can Impact DDoS Attacks

Domain Name System (DNS) plays a big role in consumers' day-to-day Internet usage and is a critical factor when it comes to distributed denial-of-service (DDoS) attacks. Learn three ways your DNS can have an impact on DDoS attacks.

Sponsor: Neustar Inc.


 

Network Transformation: A Guide to Planning Your Journey to All-IP

Historically, communication service providers (CSPs) have viewed network transformation through the narrow lens of technology, as though it were a simple matter of upgrading equipment. But in reality, the solution is much more complex. To ensure a smooth transition to an all-IP network, it's essential for each area of the business (IT, marketing and operations) to work together and consistently communicate throughout the journey.

Sponsor: Neustar Inc.


 

Network Transformation: A Guide to Planning Your Journey to All-IP

Historically, communication service providers (CSPs) have viewed network transformation through the narrow lens of technology, as though it were a simple matter of upgrading equipment. But in reality, the solution is much more complex. To ensure a smooth transition to an all-IP network, it's essential for each area of the business (IT, marketing and operations) to work together and consistently communicate throughout the journey.

Sponsor: Neustar Inc.


 

Three Ways Your DNS Can Impact DDoS Attacks

Domain Name System (DNS) plays a big role in consumers' day-to-day Internet usage and is a critical factor when it comes to distributed denial-of-service (DDoS) attacks. Learn three ways your DNS can have an impact on DDoS attacks.

Sponsor: Neustar Inc.


 

DDoS Infographic: How Are Attacks Evolving?

For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger? What new tactics are criminals employing? See this infographic for clues.

Sponsor: Neustar Inc.


 

The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report

DDoS attacks against high-tech firms have started to take a dangerous turn. It's called DDoS smokescreening - attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property. This is just one insight in Neustar's 2014 Annual DDoS Attacks and Impact Survey. The resulting report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology products and/or services such as software, SaaS, IaaS as well as hardware manufacturers

Sponsor: Neustar Inc.


 

3 Questions to Ask Your DNS Host about Lowering DDoS Risks

It's no secret that DDoS attacks are worsening by the day. From the largest financial institutions to smaller Internet companies, everyone's a target. Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size. Most of these conversations boil down to three key questions and form the conversation you should be having, too-whether you use Neustar, another provider or your in-house team to manage your external DNS.

Sponsor: Neustar Inc.


 

Protect Your Company, Read the "Internet Threats Trend Report"

Empower your company to defend its critical information assets with CYREN's Internet Threats Trend Report which includes actionable data about new threat activity. CYREN analyzes 4 trillion Internet security transactions annually, gaining unique insight on the threat landscape behind the headlines.

Sponsor: Cyren


 

Combating Identity Theft in a Mobile, Social World

As mobile devices and social media become more deeply intertwined, identity thieves are finding new ways to target victims with disastrous efficiency. Offering identity theft protection and remediation allows businesses to give their workforce the confidence to efficiently engage while bringing financial reward to the company at large.

Sponsor: LifeLock


 

After a Breach: Managing Identity Theft Effectively

This white paper from LifeLock Business Solutions notes that FIs in addition to managing fraud should strive to turn a negative event for customers into a positive, relationship-building experience. Learn why ID theft has soared and what steps banks can take in response.

Sponsor: LifeLock


 

Combating Identity Fraud in a Virtual World

A world that is more connected and mobile than ever brings new identity fraud risks and costs. This slide presentation reveals key findings from the Javelin Strategy & Research 2012 Identity Fraud Report about mobile and social trends, the real risks of identity fraud and what individuals and businesses can do to keep personal information safe.

Sponsor: LifeLock


 

3 Questions to Ask Your DNS Host about Lowering DDoS Risks

It's no secret that DDoS attacks are worsening by the day. From the largest financial institutions to smaller Internet companies, everyone's a target. Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size. Most of these conversations boil down to three key questions and form the conversation you should be having, too-whether you use Neustar, another provider or your in-house team to manage your external DNS.

Sponsor: Neustar Inc.


 

The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report

DDoS attacks against high-tech firms have started to take a dangerous turn. It's called DDoS smokescreening - attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property. This is just one insight in Neustar's 2014 Annual DDoS Attacks and Impact Survey. The resulting report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology products and/or services such as software, SaaS, IaaS as well as hardware manufacturers

Sponsor: Neustar Inc.


 

DDoS Infographic: How Are Attacks Evolving?

For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger? What new tactics are criminals employing? See this infographic for clues.

Sponsor: Neustar Inc.


 

Three Ways Your DNS Can Impact DDoS Attacks

Domain Name System (DNS) plays a big role in consumers' day-to-day Internet usage and is a critical factor when it comes to distributed denial-of-service (DDoS) attacks. Learn three ways your DNS can have an impact on DDoS attacks.

Sponsor: Neustar Inc.