DNS security best practices

Secure Your Network with DNS – Episode 1: Best Practices Overview

This blog is the first of four episodes which help describe best practices for utilizing DNS to protect your overall...

Read more
LTE DNS over TLS response

Breaking LTE on Layer Two – DNS Over TLS Response

Recent disclosure of a paper describing an attack (aLTEr) against LTE networks titled “Breaking LTE on Layer Two” is surprisingly…

Global DNS Threat Report Results

North American Businesses Aware of DNS Threats, But Not How to Mitigate Them

This is the third installment in a series of regional explorations into the network threat landscape. After Europe and Asia-Pacific…

Ensuring Cloud Independence

By 2020 over 90% of companies will be utilizing cloud services offered by multiple providers, using various orchestration tools. To…

Global DNS Threat Report Results

APAC Businesses Need to Give DNS More Tender Loving Care

The US is undoubtedly home to some of the world’s most valuable tech companies and is worthy of wearing the…

Overcoming the Limits of SIEM for Network Security

How to Overcome SIEM Limitations for Network Security

SIEM technology has been in existence for more than a decade, providing consolidated security reports from correlated event logs, often…

IoT and Network Automation

Successful IoT Projects: The Key Role of Automation

The Internet of Things (IoT) is placing huge challenges on network managers across all industries. With booming endpoint numbers and…

European businesses must work harder to keep DNS protected

European organizations seem somewhat neglectful of their data. Perhaps the first thing that  comes to mind, is British firm Cambridge…