DNS DNS Security Network Automation How to Enhance Threat Intelligence with Newly Observed Domains Domain names life cycle… Domain names are used as a way to abstract the location of the related application or service and hide its IP address to the user. It is much easier to remember...
DHCP DNS DNS Security Enhancing IoT Security with DNS CQF IoT devices are popping up every second, with many being on an organization’s network but not always under the control of I&O teams. These devices are required to be identified, inventoried, screened, managed and secured...
DDI DNS DNS Security Application Access Control: It All Starts with DNS Most IP communication starts with a DNS query to translate the server name contained in a URL or any application solution into an IP address. Whether it uses TCP or UDP (or any other communication...
DDI DNS DNS Security Remote Worker Protection Using DoH Most organizations now have remote workers and need to provide them with maximum comfort and security to perform their operations. We all know that DNS can be abused to carry out very powerful attacks, animate...
DDI DNS Why Using DoH is Questionable DoH (DNS over HTTPS) is an interesting solution for securing the transport of DNS traffic up to the first resolver. But is it required? What are the drawbacks? Do we really need it? Can we...
Application Traffic Routing DDI DNS Security Predictions 2020: Networks and IT Biggest Impacts From 5G driving SDN and NFV, to exploding enterprise apps, edge computing, connected hybrid clouds and, of course, cybersecurity, the new decade in 2020 promises to be very eventful for network and security managers across...