WHy you shouldn't rush into DoH

Why You Shouldn’t Rush Into DoH

While being a core component of the Internet, the DNS remains one of the least secure protocols in active use....

Read more

Mass Wi-Fi at Events: How to Manage Peak Loads and Customer Experience

This week’s blog comes to us from our very own Paul-Emile Bellaloum, Global Project Delivery Manager. I’ve been playing tennis…

Protect your DNS, protect your data

For the past four years, the DNS Global Threat Report created from Coleman Parkes survey data explored the technical causes…

Data theft- firewalls alone cannot protect

Data Theft: Why Firewalls Alone Cannot Protect You

Who nowadays is not worried their data will be used without their permission? Recent major data breaches, from Equifax to…

DDI Uncovered: Bringing Networks Substantial Time and Cost Savings

Once upon a time, IT managers had a piece of paper in their hand detailing every IP address and MAC…

Network Armageddon comic post

Network Armageddon: The Origin Episode 21 – Internal DNS

“Network Armageddon: The Origin” is an EfficientIP comic, following four IT colleagues as they navigate the perils of the evolving…

Network Armageddon comic post

Network Armageddon: The Origin Episode 20 – Sabotage

“Network Armageddon: The Origin” is an EfficientIP comic, following four IT colleagues as they navigate the perils of the evolving…

telco industry DNS security

DNS Security – The Telecom Sector’s Achilles’ Heel

Telefonica, Deutsche Telekom, TalkTalk and Verizon have been wake up calls for telecom cyber security over the past year. The…

Network Armageddon comic post

Network Armageddon: The Origin Episode 10 – Protecting Your DNS

“Network Armageddon: The Origin” is an EfficientIP comic, following four IT colleagues as they navigate the perils of the evolving…

Art Imitating Life: Mr. Robot and the Lessons of DNS Security

With the return of USA Network’s hit series Mr. Robot to television screens last month, DNS security has again shown…