Understanding why web proxy is not enough

Web Proxy: Understanding Why It Is Not Enough

Web proxies are designed as intermediary layers between clients and applications, to accelerate surfing as well as securing communications and...

Read more
LTE DNS over TLS response

Breaking LTE on Layer Two – DNS Over TLS Response

Recent disclosure of a paper describing an attack (aLTEr) against LTE networks titled “Breaking LTE on Layer Two” is surprisingly…

Global DNS Threat Report Results

North American Businesses Aware of DNS Threats, But Not How to Mitigate Them

This is the third installment in a series of regional explorations into the network threat landscape. After Europe and Asia-Pacific…

Global DNS Threat Report Results

APAC Businesses Need to Give DNS More Tender Loving Care

The US is undoubtedly home to some of the world’s most valuable tech companies and is worthy of wearing the…

Overcoming the Limits of SIEM for Network Security

How to Overcome SIEM Limitations for Network Security

SIEM technology has been in existence for more than a decade, providing consolidated security reports from correlated event logs, often…

European businesses must work harder to keep DNS protected

European organizations seem somewhat neglectful of their data. Perhaps the first thing that  comes to mind, is British firm Cambridge…

Protect your DNS, protect your data

For the past four years, the DNS Global Threat Report created from Coleman Parkes survey data explored the technical causes…

Data theft- firewalls alone cannot protect

Data Theft: Why Firewalls Alone Cannot Protect You

Who nowadays is not worried their data will be used without their permission? Recent major data breaches, from Equifax to…

X-Day GDPR countdown to compliance

Why GDPR Day is February 15th, not May 25th 2018

If you read the news, you may think the negative portrayal of General Data Protection Regulation in the media means…