DNSDNS SecurityNetwork AutomationHow to Enhance Threat Intelligence with Newly Observed DomainsDomain names life cycle… Domain names are used as a way to abstract the location of the related application or service and hide its IP address to the user. It is much easier to remember a meaningful name than a...
DHCPDNSDNS SecurityEnhancing IoT Security with DNS CQFIoT devices are popping up every second, with many being on an organizationโs network but not always under the control of I&O teams. These devices are required to be identified, inventoried, screened, managed and secured in order not to cause...
DDIDNSDNS SecurityApplication Access Control: It All Starts with DNSMost IP communication starts with a DNS query to translate the server name contained in a URL or any application solution into an IP address. Whether it uses TCP or UDP (or any other communication protocol), and whether it uses...
DDIDNSDNS SecurityRemote Worker Protection Using DoHMost organizations now have remote workers and need to provide them with maximum comfort and security to perform their operations. We all know that DNS can be abused to carry out very powerful attacks, animate botnet activities, exchange data with...
DDIDNSWhy Using DoH is QuestionableDoH (DNS over HTTPS) is an interesting solution for securing the transport of DNS traffic up to the first resolver. But is it required? What are the drawbacks? Do we really need it? Can we trust its usage and the...
Application Traffic RoutingDDIDNS SecurityPredictions 2020: Networks and IT Biggest ImpactsFrom 5G driving SDN and NFV, to exploding enterprise apps, edge computing, connected hybrid clouds and, of course, cybersecurity, the new decade in 2020 promises to be very eventful for network and security managers across the globe. Here are our...