As the threat landscape expands, online protection is no longer left solely to a single department. Implementing a strategy now calls for buy-in from top management along with involvement from multiple areas of business.
Advances in the interne...t and the proliferation of social media pose many dangers to your organisation - from counterfeiting and impersonation, to fraud and piracy - impacting consumer trust, your market reputation and your bottom line. Having a plan in place is more important than ever given the rapidly-changing threat landscape and the next generation of online criminals seeking new ways to take advantage of your brand....Read More
More than four months have passed since the General Data Protection Regulation (GDPR) became effective, resulting in many domain name registries and registrars moving to redact registrant information from their public WHOIS records (including informa...tion related to legal entities and persons not located in the European Economic Area; redactions that are beyond the scope of the privacy regulation).
Historically, domain name registrant information in WHOIS has been used by cybersecurity experts, brand protection service providers, law enforcement, intellectual property owners, and child protection advocates to identify, contact, and prosecute individuals who propagate websites that sell counterfeit goods and pirated movies, TV...Read More
Jane Sunderland, of Sunderlaw Strategies, Inc., never imagined that studying biological evolution would someday lead her down a road to data analysis in online protection.
But she joined the MarkMonitor Forum as a speaker on that very topic last week.... Juxtaposing it with the an ever-developing intellectual property industry, she explained:
“It’s about figuring out what the data has to say about trends,” she said. “There have been a lot of changes.”
Among those changes – the fact that online protection challenges now span more business departments and industries than ever. In fact, a MarkMonitor report, slated for release this October,...Read More
When selecting which marketplaces to protect, it matters little if web visits number in the millions. If users are leaving before they buy, then brand protection efforts can go to waste. After all, it only takes one click to make a purchase, and wher...e that click happens is what counts.
When users are buying in places where they spend less time, you need to know about it. Armed with the right data, you can save time and money by targeting your online protection strategy.
A similar protocol goes for search engines. When searching online, 91 percent of traffic never ventures beyond...Read More
Decentralized domains such as .BIT, .ETH, .COIN, and .LIB, which are based on blockchain technology, have experienced renewed relevance with the growing popularity of blockchain technology and data privacy policies. While these "domains" are not true... domain names – meaning they do not use the ICANN-coordinated DNS and do not resolve to content in the traditional sense – they do allow for other activities among cryptocurrency holders such as connecting directly to their ‘wallets.’ While originally these domains were minimally used, lately they have increased in importance as they begin to impact the new gTLD namespace, and the “real DNS”, in...Read More