By Partnering with Malwarebytes, Nominum Strengthens Closed Loop Security Solutions for Subscribers

By Brian McElroy, Vice President, Business Development

Puzzle pieces blocking sun

Posted on April 12, 2017 in: Security

Tags: ,

Digital transformation is about more than how technology advances can improve efficiencies in the collection, processing and distribution of information. Today’s empowered subscribers are demanding more control over their digital experiences, which requires communications service providers (CSPs) to offer innovative services that are simple to use, secure, and that enhance the digital lifestyle. A key part of this transformation is cybersecurity, given the amount of time consumers spend online and the number of online transactions they complete every day. The need for strong protections – both for users and for the networks they use – is particularly acute in the telecom sector.

Read more

Fighting Cybercrime with DNS

By Craig Sprosts, Vice President of Product Management

Posted on March 2, 2017 in: Security


I recently sat down with Steve Saunders of Light Reading to talk about the role DNS plays in understanding and fighting emerging cyberthreats. In the interview, we went through the highlights of Nominum’s recent Data Science report, in which our Data Science team studied more than 15 trillion queries over a three-month period and reported on the world of cybersecurity through the lens of DNS, uncovering trends in phishing attacks, DDoS, the Mirai botnet, Locky ransomware, IoT-based threats and more. Read more

Canadian Internet Registry Authority Protects Business and Public Sector Users with Nominum

By Arlen Frew, GM, security and applications

Lady at computer

Posted on February 15, 2017 in: Security

Tags: ,

With cyberthreats increasing in size and scope, businesses are scrambling to find new ways to protect their financial and human capital assets. Many enterprise solutions offer endpoint protection and network security, but the SMB sector doesn’t have the budget to deploy enterprise security solutions and typically lacks the in-house expertise to keep their networks and users adequately protected. In particular, as employees bring mobile devices onto corporate networks, and with new attack variants being introduced almost daily, small and mid-sized businesses have no way of keeping up. This is where communications service providers (CSPs) can step in to provide a broad layer of protection, visibility, and control from within their own networks.

Read more

Protecting against Mirai with DNS Security

By Yuriy Yuzifovich, Head of Data Science & Security Research at Nominum

Mirai Blog thumbnail

Posted on December 21, 2016 in: Security

Tags: , , ,

One of the biggest cyberthreats making the rounds on the internet is the Mirai botnet. Mirai targets connected Internet of Things (IoT) devices, using each infected device to launch DDoS attacks and cause website outages around the globe by flooding them with queries. Examples of recent Mirai-generated web outages are the Dyn attack which took down or significantly slowed sites like Airbnb, Twitter, the New York Times, CNN, Fox News, Netflix and many other popular domains in late October of this year, as well as the attack that temporarily took down security expert Brian Krebs’ KrebsOnSecurity website in September.

Read more

How Nominum Data Science Thwarts Cybercrime Through Industry-Leading DNS Data Analysis

By Yohai Einav, Nominum Data Science

Nominum Data Science Thwarts Cybercrime

Posted on December 6, 2016 in: Security

Tags: , ,

Nominum’s inaugural security report published by its Data Science team, Data Revelations: Fall 2016, includes an analysis of some of the largest threats that are impacting organizations and individuals, including ransomware, DDoS, mobile malware, IoT-based attacks and more. Since DNS is the launch point for over 90% of cyberattacks, it offers a great vantage point from which to examine, understand, thwart and proactively prevent threats1. With industry-leading research experience, and by applying machine learning, artificial intelligence, natural language processing, neural networks and more, Nominum Data Science is able to locate, analyze, prevent and predict some of the most sophisticated and dangerous cyberthreats ever to hit the internet.

Read more

The Rise in DDoS and other Cyberattacks: Applying New Data Science Insights to Understand Today’s Emerging Threats

By Yuriy Yuzifovich, Head of Data Science and Security

Posted on November 3, 2016 in: General, Security

Tags: ,

Nominum Data Science just released a new Data Science and Security report that investigates the largest threats affecting organizations and individuals, including ransomware, DDoS, mobile device malware, IoT-based attacks and more. Below is an excerpt.

Read more

What CSPs Can Learn from the Latest DDoS Attacks

By Craig Sprosts, Vice President, Product Management & Strategy

Posted on October 24, 2016 in: General, Security

Tags: , ,

On Friday, October 21, 2016, there was a major distributed denial of service (DDoS) attack that took down major U.S. company websites, including Twitter, Paypal, The New York Times, Box, Netflix and more. The attack targeted managed DNS provider Dyn Inc., which hosts the authoritative DNS for these popular domains. The attack originated from a large number of compromised IoT devices, including internet-connected cameras, routers and digital video recorders.

Read more

Examining the Long-Tail of DNS Queries: A Hotbed of Cybercriminal Activity

By Yuriy Yuzifovich, Head of Data Science and Security

Posted on October 11, 2016 in: General, Security

Tags: ,

Data scientists put in a tireless amount of work tracking cybercriminals—from specific individuals to entire organizations—looking at their behavior and the methods through which they attempt to compromise data. Because DNS is a ubiquitous protocol that’s used for most internet interactions, it also provides fertile ground for cybercriminals to launch malware. Nominum Data Science examines massive volumes of DNS data—100 billion queries daily—to detect anomalies and uncover the patterns of malicious code authors before other security experts.

Read more

1 2 3 6