Digital Transformation is Happening. So Where’s the Paradox?

By Brian Metzger, Vice President of Global Marketing

Digital Transformation Paradox

Posted on September 21, 2016 in: General, Marketing

Tags: ,

Our CEO Gary Messiana was recently interviewed by Light Reading CEO Steve Saunders to discuss how Nominum is accelerating the digital transformation efforts of communication service providers (CSPs), and to shed light on what we’re calling the “digital transformation paradox.”

Read more

In-browser Messaging: A Highly Effective Way to Reach Subscribers with Targeted Content

By Daniel Blasingame, VP of Sales, North America

blog-in-browser-messaging

Posted on August 23, 2016 in: General, Marketing

Tags: , , , , , ,

For service providers, achieving the subscriber communications trifecta is nearly impossible: that is, sending the right message to the right person. Email is a heavily used subscriber communications method, given both its low cost and the ability for subscribers to view the message at their convenience.

Read more

Protect and Enhance the Subscriber Experience to Grow the Bottom Line

By John Arledge, General Manager

protect-enhance-bottom-line

Posted on July 19, 2016 in: Marketing

Tags: , , , , , ,

For service providers undergoing digital transformation, the importance of subscriber and network protection cannot be understated. When subscribers and networks are at risk of attack or infection, a provider’s digital strategy is weakened and business growth limited.

Read more

Putting Subscribers First Accelerates Digital Transformation

By Brian Metzger, Vice President of Global Marketing

subscriber-first-accelerate-transformation

Posted on July 1, 2016 in: Marketing

Tags: , , , , , , , , ,

As communication service providers (CSPs) position their businesses for the digital economy, one significant shift must be prioritized—their investment in personalized, subscriber-centric services. Put another way, a subscriber-first strategy is essential to digital transformation, according to industry experts.

Read more

What’s in a Name? Leveraging DNS to Personalize Services

By John Arledge, General Manager

leveraging-dns-personalize-services

Posted on June 23, 2016 in: General, Marketing

Tags: , , , , ,

In his latest white paper, “Innovation in Communication Services: Breaking with the Past without Waiting for the Future,” Patrick Donegan of Heavy Reading discusses a key aspect of digital transformation: the ability to offer innovative services that enhance the subscriber experience. More specifically, he discusses the need for personalized services—as well as why DNS technology is an ideal way to achieve personalization in new service offerings.

Read more

Predicting Dynamic Malware Threats

By Bruce Van Nice

predicting-dynamic-malware-blog

Posted on June 20, 2016 in: General, Marketing, Network, Security

Tags: , , , , , ,

We just released a new whitepaper outlining the upcoming types of cyberthreats and malicious activity affecting digital consumers, and how organizations and operators can address them. Below is an excerpt. To read the full report, click here to download.

Read more

DNS: The “Third Way” to Digital Transformation

By Patrick Donegan, Heavy Reading

JK Bridge in Brasilia, Capital of Brazil

Posted on June 13, 2016 in: General, Marketing, Network, Security

Tags: , , , , ,

Last week we launched a new whitepaper by Patrick Donegan of Heavy Reading, titled “Innovation in Communications Services: Breaking with the Past without Waiting for the Future.” The paper discusses a ‘third way’ to service provider digital transformation, utilizing DNS. Read the blog post below for an excerpt from Donegan’s paper, which you can download in its entirety here.

Read more

Unlocking Locky

By Mikael Kullberg, Nominum Data Science

Locky

Posted on June 2, 2016 in: General, Network, Security

Tags: , , , , ,

Locky is a new cyberthreat that has received a lot of attention in security circles over the last few months because it has been unusually successful. Locky is advanced ransomware that encrypts a person’s files and holds them for ransom. It uses a number of different technologies to avoid being detected or blocked and takes great care to hide its path back to the attackers. The code is obfuscated to avoid detection by antivirus and malware software. The blackmailers communicate through TOR and only accept Bitcoin as payment, making it nearly impossible to discover who they are.

Read more

1 2 3 4 5 10