The SSL saga continues.
Security certificates are becoming increasingly more important for establishing trust as more users transact online. Threats of online identity theft and fraud have led consumers and business partners to demand assurance that ...personal, financial and business data remains safe. New changes in internet standards and web browsers are giving websites that use HTTPS a leg up and are actively distrusting unsecure sites that remain on HTTP.
Mid-October will herald the release of Firefox 63 and Chrome 70. As a result, users who visit websites with missing or outdated SSL certificates will be greeted with security warnings.
The world of piracy has changed dramatically from just a few years ago.
As technology has advanced to make our working and social lives easier, it’s also allowed pirates to become more sophisticated. They’re even pirating pirated sites and stealing t...he branding of more popular sites using subdomains, redirecting traffic much like they do from legitimate sites.
More than that, the profile of the consumer of digital pirated content has changed too. A few years ago, getting your hands on illegal content took a bit of effort. Yes, it was largely peer-to-peer based, uploading and downloading shows, music and movies, but...Read More
When selecting which marketplaces to protect, it matters little if web visits number in the millions. If users are leaving before they buy, then brand protection efforts can go to waste. After all, it only takes one click to make a purchase, and wher...e that click happens is what counts.
When users are buying in places where they spend less time, you need to know about it. Armed with the right data, you can save time and money by targeting your online protection strategy.
A similar protocol goes for search engines. When searching online, 91 percent of traffic never ventures beyond...Read More
There’s no question that intellectual property is at stake online. The question is how it’s being compromised.
Infringements, malware, phishing – one thing these threats have in common is that they leverage your brand equity. To defend yourself again...st this shapeshifter, you’ll need to understand your attacker’s intent – are they out to siphon your money, or your traffic?
Is it the brand they’re after?
Brand reputation can be influenced by many factors. The inevitable exposure that comes with doing business online heightens the risk to both an organization’s reputation and to its security. Damage to reputation, lost revenue and increased...Read More
Decentralized domains such as .BIT, .ETH, .COIN, and .LIB, which are based on blockchain technology, have experienced renewed relevance with the growing popularity of blockchain technology and data privacy policies. While these "domains" are not true... domain names – meaning they do not use the ICANN-coordinated DNS and do not resolve to content in the traditional sense – they do allow for other activities among cryptocurrency holders such as connecting directly to their ‘wallets.’ While originally these domains were minimally used, lately they have increased in importance as they begin to impact the new gTLD namespace, and the “real DNS”, in...Read More