As cyber attacks and brand abuse become more sophisticated and damaging, monitoring and investigative tactics have to grow in scope to include DNS and Whois data, as Tim Chen explains.
Network security professionals have long been on the cutting edge of technology and the use of data to address compromises. Security breaches and cyber attacks can destroy incredible amounts of value in a very short time. A 2013 study by the Ponemon Institute showed that cyber attacks cost companies an average of $5.4 million per attack.
By taking a deeper look at the methods and tools used by network security professionals, processes to improve online brand protection strategies can be identified.
Network security starts with data. The basic network security model involves installing sensors or other data collection points within the client network. Service providers will overlay deep data analytics and pattern recognition in order to detect abnormal network behaviours. Often the terabytes of internal network data will be augmented by sourcing significant amounts of external data such as IP blacklists or spam domain lists.
To continue reading, you need a subscription to WIPR. Start a subscription to WIPR for £455.
In-house feature articles, the archive and expert comment require a paid subscription. Subscribe now.
Want to give it a try? We are offering a two week free trial to the WIPR website – register and select “Free Trial” to begin access to the full WIPR archive and read the latest news, features and expert comment. Begin your free trial here.
Is your 2 week free trial about to end? Upgrade to a 12 month subscription for £455 now.
If you have already subscribed please login.
If you have any technical issues please email James Lynn on email@example.com.
whois, domain name, DNS, trademark, cyber attacks, brand abuse