Overcoming the Limits of SIEM for Network Security

How to Overcome SIEM Limitations for Network Security

SIEM technology has been in existence for more than a decade, providing consolidated security reports from correlated event logs, often...

Read more

Europe’s False Sense of Cyber Security

Once upon a time, the scariest IT Security stories concerned the US almost exclusively. Such high-profile debacles as the Target…

DNS attacks are getting more sophisticated – North Americans better buckle up!

For the third year, EfficientIP conducted one of the largest surveys exploring the technical and behavioral causes for the rise…

Battling connected IoT devices with DNS security

Win the Battle Against Connected Devices with DNS Security

Connected cameras, vending machines and light bulbs have become the unexpected vectors of the latest cyberattacks. These are just the…

Traditional firewalls are not enough to protect DNS

Why Protecting DNS Requires More Than Firewalls

Way back when, in the early days of the Internet, all we needed to protect our systems was a firewall….

Using DNS to Defend Against IoT Botnets

Sometimes cyberattacks come from a direction you weren’t really expecting. We all know about threats from ransomware, nation-state actors, industrial…

GDPR Compliance IDC Blog

Ensuring GDPR Compliance by Preventing DNS Exfiltration

The implementation of the EU’s new General Data Protection Regulation (GDPR) is now a bit more than a year away….

Public sector network security prone to exfiltration and DDoS attacks

Public Sector Network Security: A Race Against Time

As we move more and more of our government-citizen interactions online, making sure we have access to those services becomes…

2016 in Review: A Year of Network Security Landscape Changes

Network security and data protection remain at the top of many CIOs and CSOs’ agendas, as increasingly powerful privacy regulations…