Traditional Firewalls Are Not Enough

Why Protecting DNS Requires More Than Firewalls

(This week’s blog article was originally published in March 2017, but still rings true today). Way back when, in the...

Read more
WHy you shouldn't rush into DoH

Why You Shouldn’t Rush Into DoH

While being a core component of the Internet, DNS remains one of the least secure protocols in active use. DNS…

Data Driven Network Security with Machine Learning

Data Driven Network Security with Machine Learning

Today’s threats are sophisticated, malware deploy themselves a long time prior to activation using complex command and control mechanism, and…

Responding to rapidly growing DNS threats, a critical need for APAC organizations

The average financial loss to organisations across Asia Pacific from DNS attacks is on the rise, up 19% from last…

2019 Global DNS Threat Report Europe Results

Europe Opens Up Its Wallet for DNS Attack Cost

2019 marks another year of hikes in the DNS attacks experienced by organizations, as well as the cost of them….

U. S. Companies Hemorrhage Costs When It Comes to DNS Security

Stop the Bleed: U.S. Companies Hemorrhage Costs When It Comes to DNS Security

U.S. businesses need a tourniquet. Fast. According to our annual Global DNS Threat Report, which looks at the cause and…

DNS hijacking + DNSSEC

Worried About DNS Hijacking? DNSSEC Can Help

Most of the time, DNS is seen as a commodity, but the service it provides on the Internet and within…

Zero trust Security Perimeter

Zero Trust: Verifying beyond perimeters, DNS security is key

Zero trust architecture is a paradigm focusing on a client rather than networks. It can be complex to set up,…

Public Cloud Platform

Public Cloud Platforms Are Not Waterproof

Digital transformation is eased by cloud infrastructures Many organizations are starting their journey to the cloud by moving some workloads…