Recent Articles

It Was Fun, and BSides, Whois Able To Resist Security Geekery?

It Was Fun, and BSides, Whois Able To Resist Security Geekery?

| August 18, 2015 | 0 Comments

With a week or so to catch my breath, I’m now happy to share some observations from the high-energy activities we recently pursued in Vegas. Also, a bit on the security shows you may have heard about that took place there. This was DomainTools’ first appearance at a BSides event, and the first time for […]

Continue Reading

Summer, SANSFIRE, Heat, and Home Runs

Summer, SANSFIRE, Heat, and Home Runs

| July 7, 2015 | 0 Comments

As we reflect on our latest event ‒ SANSFIRE 2015 in Baltimore ‒ we can tell summer is here, no doubt about it. While in Baltimore, when our weather apps said “Currently 100°F, Feels like 135°F” we knew something wasn’t right for our team that flew in from Seattle. But it so aptly matched the […]

Continue Reading

Reflections on the Gartner Security and Risk Management Summit

Reflections on the Gartner Security and Risk Management Summit

| June 26, 2015 | 0 Comments

As DomainTools has come into its own as a player in the cybersecurity realm, we have added a lot of security-themed events to our annual calendar. A recent example was the 2015 Security and Risk Management Summit put on by Gartner, in Washington, DC. While this show has run for a number of years now, […]

Continue Reading

Information Sharing in Financial Services Cybersecurity

Information Sharing in Financial Services Cybersecurity

| June 1, 2015 | 0 Comments

As we return from FS-ISAC in Miami’s South Beach—where LeBron James hasn’t been spotted lately—we’d like to reflect on some of the conversations we had. DomainTools took this as an opportunity to listen to financial services institutions and learn more about the industry and trends. As FS-ISAC stands for Financial Services Information Sharing Analytics Center, […]

Continue Reading

Profiling malicious domains in The DomainTools Report

Profiling malicious domains in The DomainTools Report

| May 5, 2015 | 0 Comments

At the 2015 RSA Conference in San Francisco, we released the first edition of The DomainTools Report: A Profile of Malicious Domains. In this report, we investigate the attributes of malicious domains connected to malware, spam, phishing, and botnets. Using an aggregation of blacklists and DomainTools’ data, we compared the bad actors’ preferences for TLDs, […]

Continue Reading

RSA 2015 – Bigger, Bolder, Richer

RSA 2015 – Bigger, Bolder, Richer

| May 5, 2015 | 0 Comments

As we finish our week long recovery after The RSA Conference 2015 in San Francisco, we want to recap the event and reflect on a few key trends. With most of our sales and marketing teams there to represent, 20 total exhibit hall hours, over 400 exhibitors on two show floors, 30,000 total event attendees, and […]

Continue Reading

RSA and a preview of The DomainTools Report

RSA and a preview of The DomainTools Report

| April 14, 2015 | 1 Comment

We’ve been quite busy over the past quarter getting ready for the RSA Conference in San Francisco.  In addition to preparing our booth for the exhibition and making other fun plans around the event, we’ve been hard at work on The DomainTools Report (more info below).  We’re looking forward to seeing you at in San […]

Continue Reading

Looking Back to Look Forward: The Anthem Breach

Looking Back to Look Forward: The Anthem Breach

| April 10, 2015 | 0 Comments

Part 2 of 2 In Part 1 of this discussion of threat actor analysis, we got some insights into why threat actor analysis has a major role to play in every phase of cybersecurity, from prevention to mitigation to response to monitoring. Today, we’ll take a look at how a key DomainTools partner, ThreatConnect, used […]

Continue Reading

DomainTools.com: The Evolution Continues

DomainTools.com: The Evolution Continues

| March 18, 2015 | 2 Comments

Nearly 18 months ago, we started to more directly focus on the threat intelligence arena with our leading domain name and DNS data. Cybersecurity breaches have become a major focus of organizations worldwide in recent years, and our clients have proven the value of our data in investigating attacks and securing their networks and systems. […]

Continue Reading

Attack Attribution: Looking Back to Look Forward

Attack Attribution: Looking Back to Look Forward

| March 12, 2015 | 0 Comments

Part 1 of 2 Lest we see only doom and gloom in the cascade of data breach disclosures, it’s worth acknowledging some of the outstanding work being done on the good guys’ side in the cyber wars. We’re going to take a two-part look at this, starting with some discussion of attack attribution and adversary […]

Continue Reading