Trending stories

This image of a computer chip illustrates Part 5 of our complete domain cybersecurity checklist with EBRAND CTO Anouar Adlani on DNS Zones.
Domain Cybersecurity Checklist Part 5: DNS Zones 

Welcome to Part 5 of our comprehensive domain cybersecurity checklist, where we dive into DNS zone protection! As always, we’re delivering some expert insights and valuable industry experience from EBRAND’s CTO

This image of a hand holding a compass illustrates the blog's topic: building a complete domain strategy.
A complete domain strategy for 2024 

In the fine margins of modern ecommerce, a good domain strategy can change a company’s fate. Domains, the cornerstone of the internet, support crucial business functions, from lead generation forms

This image of a castle on the beach in Puerto Rico highlights this post's main topic: ICANN's conference in San Juan.
A Chief Legal Counsel’s Insights from ICANN 79

ICANN governs the vital infrastructure that businesses and consumers depend on every day. Websites, online shops, and email servers all rely on domain names, making ICANN meeting outcomes highly significant for any modern

This image of phish illustrates this article's topic: understanding phishing/fishing domain impersonation tactics.
Top ten impersonation techniques used in phishing domains

Cybercriminals constantly create new tactics to trick their targets, exploiting typographical variations and emerging technologies to build convincing domain impersonations. Familiarising yourself with some common strategies helps you prepare your

Get in touch

Our experts are ready to provide you with a customized solution. Fill out the contact sheet to connect with us.

EBRAND

Client login

Welcome to the client login portal, where EBRAND users access their solution platforms. Select your solution below:

Not an EBRAND client yet? Sign up
Discover more on our Solutions pages