DNS security News
February 03, 2017
Data protection player Datto will expand its networking offerings through the buyout of Open Mesh; more IT channel news from the week.
November 23, 2016
In a surprising turn of events, Microsoft has announced its plans to join The Linux Foundation, despite the companies' less-than-friendly repertoire over the years. Senior Site Editor John Moore ...
November 01, 2016
A new nematode worm proof of concept could help the internet avoid the next massive Mirai IoT botnet DDoS attack, but experts are unsure of the legality of the option.
October 28, 2016
As more details emerge on last week's massive Dyn DNS DDoS, new analysis indicated as few as 100,000 Mirai IoT botnet nodes were enlisted in the incident and reported attack rates up to 1.2 Tbps.
DNS security Get Started
Bring yourself up to speed with our introductory content
Signature-based AV doesn't stop Web-based malware, but what does? Spyro Malaspinas points out what's next in enterprise malware detection technology. Continue Reading
In this primer on cloud computing security, learn about the basics of data security in the cloud, how to secure network infrastructure and devices that interact with cloud-based services and the threats and attacks that pose a risk to enterprises. Continue Reading
Evaluate DNS security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Device design and device monitoring are both critical to protecting IoT devices from cybersecurity vulnerabilities, advises Brian Berger of Cytellix. Continue Reading
Geofencing technology is increasingly being used as a security tactic, such as to control access to servers with DNS settings. Expert Michael Cobb explains how it works. Continue Reading
In this excerpt from chapter two of DNS Security: Defending the Domain Name System, authors Allan Liska and Geoffrey Stowe discuss why DNS security is important. Continue Reading
Manage DNS security
Learn to apply best practices and optimize your operations.
Phishing attacks, clicking on malicious links and visiting malicious sites is a problem for hospital network security. One health system uses Cisco Umbrella to solve this problem. Continue Reading
A lot of the cloud adoption in organizations has happened in an organic fashion with little to no IT involvement and even less policy oversight. In most cases, the security, policy and cloud governance model you implement will be somewhat retroactive in nature, says Chris Pogue, CISO at Nuix.
Among the challenges in these environments is a lack of standards for evaluating a vendor's risk management and cloud governance model. This month, Information Security magazine looks at steps to help security professionals gain more insight when employees are migrating critical applications and data to the cloud.
Evaluating the security postures of cloud providers, vendors and business partners is a constant dance with the details. Security professionals need specific information that they may not get. We look at enterprise security ratings services akin to what Equifax, Experian and TransUnion do in the financial sector to provide credit ratings for individual consumers. Although the security ratings services are just starting to emerge, these reporting tools may offer another view into the security postures of third parties, and in the board room.
Farsight Security CEO Paul Vixie joins us to discuss the latest research on threats to domain name systems. As talk of digital transformation continues, internet security and cloud governance models will remain top of mind for executives. "Now, IT is the big risk, and we are not looking at the old risks anymore now that the internet has connected everybody to everybody," Vixie says.Continue Reading
DNS rerouting by cloud security service providers may not be enough for DDoS mitigation when attackers can uncover targets through alternate means. Expert Ed Moyle explains. Continue Reading
Problem Solve DNS security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
IoT botnet DDoS attacks have been growing in volume and impact. Expert Nick Lewis explains how you can ensure your internet-connected devices are secure from IoT malware. Continue Reading
A DNS reflection attack is like a regular denial-of-service attack, but much worse. Nick Lewis explains why. Continue Reading
Expert Dan Cornell explains how to ensure mobile apps behave securely -- even when they encounter untrusted Wi-Fi or Bluetooth connections. Continue Reading