DNS RFCs: The Elephant in the Room – Part 1

DNS goes back a long way, it is more than 25 years old and is one of the most used,...

Read more

Why IPAM Repository is the Key Enabler for Network Automation

Nowadays, things are moving quickly and nothing is set in stone. The same is true for IT and networking services….

Cybersquatting: The Basics Part 2 – How to Protect Yourself

In part 1 of this blog series we learned about the strategies and attack types used for cybersquatting. We’ll now…

Cybersquatting: The Basics Part 1 – Strategies and Attack Types

DNS is no longer just a name resolution system to make our lives easier in the day-to-day use of applications….

Augmenting Zero Trust: Why Using DNS Allow Lists is a No-Brainer

You can’t control what you can’t see, as the saying goes. One of the main pillars of Zero Trust Foundations…

Top 5 IT Network and Security Predictions for 2022

Welcome to 2022, a year which promises to be full of turbulence with the pandemic still ongoing and organizations forced…

2021 Year in Review: Networking and Security in a Pandemic World

With the Covid pandemic still ongoing, 2021 turned out to be a very disruptive year for organizations and their network…

SOLIDserver NOT Impacted by Log4j Security Vulnerability

The EfficientIP SOLIDserver Solution is not affected by the security vulnerability described in the CVE-2021-44228 as it does not in…

DDI for Telco: Improving Business Continuity, Operational Efficiency and Scalability

For Telecom operators and Internet Service Providers, IP networks are becoming increasingly complex to manage and evolve. Multi cloud, IoT,…