Zero Trust- Perimeter Security is not enough

Zero Trust: Verifying beyond perimeters, DNS security is key

Zero trust architecture is a paradigm focusing on a client rather than networks. It can be complex to set up,...

Read more
Public Cloud Platforms are not waterproof

Public Cloud Platforms Are Not Waterproof

Digital transformation is eased by cloud infrastructures Many organizations are starting their journey to the cloud by moving some workloads…

Five predictions for Asia Pacific DNS security

Five Predictions for Asia Pacific DNS Security in 2019

This week’s blog comes to us from our very own Nick Itta, VP Sales APAC.   With 2018 coming to…

DNS Flag Day

DNS Flag Day: Notes for EfficientIP Customers and Beyond

DNS is one of the foundation protocols of the internet, designed around 1987- which can technologically seem like an eternity…

DNS Threat Intelligence for SOC: How It Needs to be Built

DNS Threat Intelligence for SOC: How It Needs to be Built

Extreme diversity and growth of menaces, together with increasing network complexity, is making it very challenging for today’s security managers…

2019 IT and Network Predictions

IT and Networks 2019: Prediction of Biggest Impacts

2019 is here, so it’s time to look closer at what this year will bring for network management, IT digital…

2018 Year in Review Blog - DNS Hacks

2018: The Year That Saw DNS Hacks Bring the Internet to its Knees

2018 has turned out to be the year of the breach. No sooner than we got over November’s LastPass outage,…

Understanding why web proxy is not enough

Web Proxy: Understanding Why It Is Not Enough

Web proxies are designed as intermediary layers between clients and applications, to accelerate surfing as well as securing communications and…