THOUGHT LEADERSHIP FROM CSC

BEST PRACTICE GUIDE

Domain Security Checklist

Domain Security Checklist

While companies are making significant investments to improve their security posture and reduce risk, many are still exposed to security blind spots when it comes to proactively and securely managing some of the most fundamental internet assets that allow them to conduct business—unsecure domain names, DNS, and digital certificates.

BEST PRACTICE GUIDE

Digital Asset Security: Back to Basics

Digital Asset Security: Back to Basics

Worldwide, cyber attacks and data breaches are coming from all directions. They're on the rise, making it harder to secure an online brand.

So how can you manage today's risks? Get back to the basics of digital asset security.

BEST PRACTICE GUIDE

6 Ways to Strengthen DNS Security

6 Ways to Strengthen DNS Security

At the inception of the internet and domain name system—aka, DNS—only education organizations and government bodies were online. Back then, trust was assumed and security wasn't even a thought. But today with the world online, DNS is one of the most regular targets of cyber criminals.

BEST PRACTICE GUIDE

The Case for a Secondary DNS Service

The Case for a Secondary DNS Service

Enterprise security was previously focused on protecting the online perimeter (i.e., the network border). Blocking malware and bad agents from entering the network meant protecting your data and your business.

WEBINAR

DNS Hijacking: Recent Events & Recommendations

DNS Hijacking: Recent Events and Recommendations

Businesses have invested in security solutions at an exponential rate to protect their organizations from cyber threats. Yet, many companies remain exposed to what security experts are now referring to as critically important security blind spots.

REPORT

Dot Brand Insights: February 2020

Dot Brand Insights: February 2020

In our February 2020 Dot Brand Insights Report, our experts look at the increase in the number of .BRAND domain name registrations and the steady climb of domains under management (DUM)—including what industry is responsible for a 200% DUM count.

New gTLD, New gTLD, .Brand, dotBrand, .Brand ecosystem, TMCH, DMARC, DPML

BEST PRACTICE GUIDE

Beyond The Firewall: Implementing DNS Defenses To Mitigate Online Vulnerabilities And Threats

Beyond the Firewall: Implementing DNS Defenses to Mitigate Online Vulnerabilities and Threats

DNS forms the underlying infrastructure for how the internet works, serving as a directory to point users to the right web content. When DNS goes down, websites, email, voice-over IP, and remote employee login goes down with it.

IN THE NEWS

The 3 Most Detrimental Cyber Attacks And How To Stop Them

The 3 Most Detrimental Cyber Attacks and How to Stop Them

Cyber attacks. They happen every day and affect everyone from companies down to consumers. Many companies aren't yet doing enough to protect their brand and their customers—and it's easier than you think. Putting a few key security measures in place can help with cyber attack prevention. Sometimes, even before they hit the inbox.

In this report, we talked to our chief information security officer, Scott Plichta, to get the inside scoop on the three most detrimental cyber attacks and how to stop them.

Cyber Security, cyber attacks

BEST PRACTICE GUIDE

10 Steps to Tackling Online Counterfeiting

10 Steps to Tackling Online Counterfeiting

In an interactive guide, we've identified 10 best practices that can help you tackle online counterfeiting. From understanding your critical business drivers—like revenue and reputation—to identifying what channels to monitor, and choosing your targets.

Brand Protection, counterfeit, anti-counterfeit, marketplace monitoring, brand protection, online brand protection, best practice guide

REPORT

Cyber Security Report

Cyber Security Report: October 2019

In our October 2019 Cyber Security Report, we focus on global government defense contractors and the continued attacks on these agencies resulting in breaches that impact the security of a nation and the well-being of its citizens.

Since domain names, DNS, and certificates power the basic infrastructure of the internet, sensitive apps, tools, systems, and information relying on this infrastructure can fall into the wrong hands if not secured with the proper controls.

Cyber Security, cyber security, DNS, DNSSEC, SSL phishing, anti-phishing, CAA record, registry lock, registrar lock, two-factor authentication, 2FA, report

REPORT

Cyber Security Report

Cyber Security Report: June 2019

Securing a company's digital infrastructure has become a major concern to corporations worldwide.

Recent CSC research focuses on the media industry, revealing that 78% of global media brands use a corporate domain registrar, yet only 37% of those have a registry lock to protect their DNS from hijacking.

Cyber Security, cyber security, DNS, DNSSEC, SSL phishing, anti-phishing, CAA record, registry lock, registrar lock, two-factor authentication, 2FA, report

BEST PRACTICE GUIDE

Developing and Launching a New Brand

Developing and Launching a New Brand

Launching a new brand or redeveloping an existing concept requires painstaking attention to detail from the initial idea to completion of the project. During the process, a business might ask questions about how their brand or product will be received, who the target audience is, and the strategy behind the change.

It's pertinent to remember your digital brand and how your launch will be viewed online. There are several best practices to keep in mind, including how monetize your online presence, and the security measures you need to keep your brand safe.

Domain Management and Strategy, domain name management, brand development strategy, brand launch, step-by-step (step by step) guide, best practice guide

BEST PRACTICE GUIDE

Digital Asset Security Checklist

Digital Asset Security Checklist

To help brand owners understand and get secure against the very real threats that exist, CSC released CSC Security CenterSM in 2018—a first-of-its-kind digital asset intelligence tool that exposes security blind spots to help mitigate cyber threats.

Our Digital Asset Security Checklist covers six key areas that are often overlooked when it comes to cyber security.

Cyber Security, digital asset vendor management, dns management, domain management and strategy, ssl management, threat mitigation, ddos mitigation, two-factor authentication, phishing, social engineering, DNS hijacking

WEBINAR

DNS Hijacking: Security Learnings From the Latest Incidents

DNS Hijacking: Security Learnings from the Latest Incidents

Waves of DNS hijacking affecting government and telecommunications domains, as well as internet infrastructure entities across the globe, has resulted in increased efforts—even emergency directives—to protect domains from further attacks.

The U.S. Department of Homeland Security (DHS) has quickly implemented new procedures to further protect federal domains. And other governments—including the U.K. and France—are following suit.

In this recorded webinar, CSC global product director of Security Services, Mark Flegg, discusses recent events, learnings gained, the most relevant developments around digital asset security, and how it all impacts your company in the fight against cyber threats.

Cyber Security, dns management, ddos mitigation, two-factor (two factor) authentication, DNS hijacking, registry lock, registrar lock, two-factor authentication, 2FA

REPORT

Dot Brand Insights: October 2019

Dot Brand Insights: October 2019

In our October 2019 Dot Brand Insights Report, our experts look at the increase in the number of activated .BRANDs—meaning .BRANDs that have registered five or more domain names within their branded domain.

Companies can create the level of security they want within their .BRAND ecosystem, building trust with their audience, including ensuring every .BRAND site employs DNSSEC, digital certificates, and DMARC. Inside, we share what six .BRANDs have to say about their domains, and what they use their .BRANDs to communicate to employees and the world.

New gTLD, New gTLD, .Brand, dotBrand, .Brand ecosystem, TMCH, DMARC, DPML

REPORT

Dot Brand Insights: May 2019

Companies are Using their New Dot Brands

CSC expert analysis shows that through the first quarter of 2019, .BRAND domain registrations increased by 5%. Simultaneously, there was a 4% increase in the total of active (live) domains—meaning, companies are using their new .BRANDs. The major contributors are customizing their websites for employees as well as customer- and country-specific initiatives.

New gTLD, New gTLD, .Brand, dotBrand, .Brand ecosystem, TMCH, DMARC, DPML

REPORT

Dot Brand Insights: February 2019

Banks, Cars, or Insurance: Which Industry Takes the Lead in Dot Brand Use?

In this edition of our Dot Brand Insights Report, our experts dissect the increasing domains under management (DUM)—including revealing what industry is responsible for the 200% lead in DUM count—and look at the increase in .BRAND registrations.

You'll also read about how Google® came to be, and read a delightful story about how they decided to use its new generic top-level domain.

New gTLD, New gTLD, .Brand, dotBrand, .Brand ecosystem, TMCH, DMARC, DPML

WEBINAR

The EU GDPR: One Year On

The EU GDPR: One Year On

On May 25, 2018, the GDPR became enforceable. While the primary purpose of the GDPR is to protect the personal data of EU residents, its real impact has been far broader in geography and scope.

In this recorded webinar, Gretchen Olive, CSC's director of policy and industry affairs, explores how the GDPR has changed much more than the rules around data privacy.

Domain Management and Strategy, GDPR, digital assets, domain names, WHOIS, cyber security, data protection

BEST PRACTICE GUIDE

Five Steps to UDRP Success

Five Steps to UDRP Success

Cybersquatting is on the rise, with a noted uptick over the past several years. Closely linked to problems such as brand abuse, traffic diversion, counterfeit goods, trademark dilution, phishing attacks, and malware distribution, cybersquatting can be very costly to brands.

Brand Protection, IP enforcement, takedown, delisting, cease and desist, domain acquisition, ownership, trademark

IN THE NEWS

GDPR: Cyber Security Issues Abound

GDPR: Cyber Security Issues Abound

CSC's Mark Flegg, global product director of Security Services, gives insight into the General Data Protection Regulation (GDPR), what this means in terms of cyber security, and how to protect yourself and your business from cyber criminals.

Cyber Security, GDPR, digital assets, domain names, WHOIS, cyber security, data protection, article 32, registry lock, registrar lock, two-factor authentication, DNSSEC

IN THE NEWS

Going Phishing: Countering Fraudulent Campaigns

Going Phishing: Countering Fraudulent Campaigns

Phishing remains the most used vehicle for corporate data breaches, credit card fraud, and identity theft. Malicious links are clicked and corporate passwords are given up, leaving companies and consumers vulnerable.

In the World Trademark Review article, Going Phishing: Countering Fraudulent Campaigns, we share why securing digital assets is a MUST—especially considering the October 2017 U.S. Department of Homeland Security Domain-based Message Authentication, Reporting, and Conformance policy and the European Union's General Data Protection Regulation (2016/679) that went into effect May 25, 2018.

Fraud Protection, phishing, anti-phishing, email fraud, spear sphishing, data theaft, data breach, DMARC

BEST PRACTICE GUIDE

The Online Counterfeit Economy: Apparel and Accessories

The Online Counterfeit Economy: Apparel and Accessories

As the digital world continues to expand and become a bigger part of our daily lives, counterfeiters are finding ways to take advantage of our reliance on apparel and accessories.

This guide is a snapshot of the apparel and accessories counterfeit market; here, we outline four key steps to protect your brand from these threats.

Brand Protection, counterfeit, anti-counterfeit, marketplace monitoring, brand protection, online brand protection, best practice guide

BEST PRACTICE GUIDE

The Online Counterfeit Economy: Consumer Electronics

The Online Counterfeit Economy: Consumer Electronics

As the digital world continues to expand and become a bigger part of our daily lives, counterfeiters around the world are taking advantage of our reliance on consumer electronics.

This guide takes a snapshot of the counterfeiting landscape in the consumer electronics market, and maps out four key steps to protect your brand from threats.

Brand Protection, counterfeit, anti-counterfeit, marketplace monitoring, brand protection, online brand protection, best practice guide

BEST PRACTICE GUIDE

Security Tool Kit

Security Tool Kit

Equip your employees and protect your company from cyber threats.

Cyber Security, cyber security, data protection, anti-phishing, spear phishing, password protection

BEST PRACTICE GUIDE

7 Steps for Creating a Successful Domain Policy

7 Steps for Creating a Successful Domain Policy

Each and every day, millions of people go online for information that will inform their decision making and purchases—and they won't access or search for your digital brand the same way.

Make sure your digital portfolio of brands is broad enough to protect and promote your brand, so all the equity you've built in your company's reputation doesn't get diluted from one lost domain. Be in a better position to secure, promote, and protect your brands online in a disciplined and accountable way by using a seven-step process—and join the growing ranks of organizations in full control of their domains.

Domain Management and Strategy, domain name management, digital assets, digital portfolio, defensive registrations, WHOIS, registry lock, registrar lock

BLOG POST

What's the Point of Domain Name Registrar Security, Controls, and Processes?

What's the Point of Domain Name Registrar Security, Controls, and Processes?

The missing links in most cyber security risk postures.

WEBINAR

Domain Name Strategy 2020

Domain Name Strategy 2020: Blocks, WHOIS, Cyber Criminals and Other Challenges

As domain name policies, data privacy, cyber security regulations, and the global threat landscape continue to rapidly evolve, so must your domain name strategy. In this recorded webinar, CSC's Gretchen Olive delves into emerging issues not to be overlooked in formulating your 2020 domain name strategy.

WEBINAR

What You Need to Know About Online Marketplaces in Asia: New trends and emerging marketplaces

What You Need to Know About Online Marketplaces in Asia: New Trends and Emerging Marketplaces

Combatting counterfeiting in online marketplaces with an effective enforcement strategy is now a key part of many successful online brand protection programs. Have you considered your strategy for online marketplaces in Asia?

WEBINAR

China's Revised Web Policies

China's Revised Web Policies

In late 2017, the Ministry of Industry and Information Technology (MIIT) of the People's Republic of China updated their domain name registration and web hosting policy.

This will impact global companies with a web presence in China—affecting not just .CN domains and Chinese international domain names, but any domain or top-level domain that is web hosted in China, including .COM and .NET, and more.

WEBINAR

ICANN 64 Kobe Insights

ICANN 64 Kobe Insights

Enjoy a look back on the ICANN 64 policy forum in Kobe, Japan, including the discussions on internet policy development, outreach, and community networking.

WEBINAR

ICANN 63 Barcelona Insights

ICANN 63 Barcelona Insights

"Meet" us in the metropolis of the Mediterranean Sea, where we take you back to Barcelona's discussions on internet policy development, outreach, and community networking.

WEBINAR

Insights from ICANN 62 in Panama City

Insights from ICANN 62 in Panama City

The second of three ICANN meetings will take place in Panama City, Panama on June 25. The four-day Policy Forum will focus on current policy development work, outreach, and daily opportunities to network with the community, including CSC experts.

WEBINAR

Internet Insights from The Walled City

Internet Insights from the Walled City

The three-legged stretch of 2018 ICANN meetings begins March 10 in San Juan, Puerto Rico, and CSC's experts will be there to report on the many internet-related to be discussed, including increasing competition on the web and the latest domain name and brand protection developments. Gretchen Olive, CSC director of Policy and Industry Affairs, and Ben Anderson, head of New gTLD Services for CSC, will then present their findings from ICANN 61 via a live webinar.

IN THE NEWS

The Life Cycle of Digital Certificates Reduces Again

The Life Cycle of Digital Certificates Reduces Again

In 2015, the CA/B Forum reduced the certificate lifetime of organization validation (OV) and domain validation (DV) certificates from four to three years.

Again in March 2018, the lifetimes were further reduced to two years, in line with extended validation (EV) certificates that were already at two years, maximum

IN THE NEWS

6 Ways to Strengthen DNS Security

6 Ways to Strengthen DNS Security

The domain name system (DNS) grew to prominence during the initial, innocent days of the internet.

During that time, early internet users tended to work for government or education organizations where trust was assumed, and security was not even a consideration.

IN THE NEWS

Why Domain Name Security Matters Most?

Why Domain Name Security Matters Most?

Cyber criminals are taking advantage of this risk and have been doing so for quite some time.

Throughout 2019, Cisco Talos warned about the state-sponsored Sea Turtle attack taking control of DNS systems and stated, "the actor ultimately intended to steal credentials to gain access to networks and systems of interest."

And just this week, Reuters reported in "Exclusive: Hackers acting in Turkey's interests believed to be behind recent cyberattacks – sources” that another group of hackers alleged to be working for the Turkish government's interests attacked government organizations and companies via DNS hijacking.

IN THE NEWS

DNS, Domain Names, and Certificates: The Missing Links in Most Cybersecurity Risk Postures

DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures

Do you know who your domain name registrar is (the domain name management company that holds the keys to the kingdom)?

What do you know about your domain name registrar's controls, security, policies and processes?

IN THE NEWS

Does Your Domain Have a Registry Lock?

Does Your Domain Have a Registry Lock?

According to data provided by digital brand protection firm CSC, while domains created in the top three most registered top-level domains (.COM, .JP and .CN) are eligible for registry locks, just 22% of domain names tracked in Forbes' list of the World's Largest Public Companies have secured registry locks.