Domain registrations, blocking, and monitoring By Connie Hon, Domain Product and New gTLD manager Share this post Your domain strategy reflects the security posture of your organization and the value of your brand. The more valuable your brand, the more
By Vincent D’Angelo Share this post The Iran geopolitical crisis will have unseen consequences on businesses worldwide. Last weekend, the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) issued an alert highlighting some of these business risks.
By David Barnett, Brand Monitoring subject matter expert Share this post The month of November marks the start of a busy shopping period in both the offline and online worlds, not only because of the proximity of the festive time
If you’re reading this, you already use or are contemplating a tool that can set you apart from the competition—a .BRAND domain. Adopting a .BRAND is a unique engine for growth. Use it to: Establish a go-to-market strategy Attract and
By David Barnett Brand Monitoring Subject Matter Expert Share this post The scale of the problem A recent study by the Organisation for Economic Cooperation and Development (OECD) and the European Union’s Intellectual Property Office found that trade in counterfeit
How Fraudsters Target Popular Festivals and What Brand Owners Can Do By Irene Oh Subject Matter Expert – Marketplace Enforcement (China) Share this post In mid-autumn, China celebrates the mooncake (or lantern) festival, which began when emperors worshipped the moon
In this post, we look at the best ways you can protect your customers from Online Impersonation, and stop them from having their personal data compromised.
Share this post Managing digital certificates can be challenging. On average, companies spend 225 hours manually managing 50 certificates a year. About 74% of enterprises have seen system outages due to unplanned certificate expiration, and over 50% have a lost
By Ken Linscott Share this post At the beginning of 2019, CSC joined the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency, the UK National Cyber Security Centre, and other leading security organizations—including Cisco® Talos, FireEye®, and Akamai—in
When fraudsters impersonate or use a company’s brand name and logo, they not only infringe on a brand’s intellectual property (IP) rights, but also devalue and dilute the brand, and as a result, cut revenue. That’s why protecting IP is