DNSDNS SecurityPrivacy LawsFrom Leading to Lagging: Europe’s NIS 2 Compliance SpectrumPreparing for compliance with the NIS 2 Directive is a top priority for any organization that either operates in Europe or counts it as a target market. Set to take full effect by October 17, 2024, NIS 2 aims to...
DNSDNS SecurityThe Key Role of Protective DNS for Phishing ProtectionPhishing attacks have been around for almost three decades. Awareness of them is wide with phishing protection measures to detect and block them included in almost every security solution. Nevertheless, they remain one of the most commonly used attack vectors....
DNSDNS SecurityNetwork Security for Higher Education: The Key Role of DNSLast year, Education and Research were the top targets for cybercriminals, according to a study by Check Point. With remote learning becoming normal, bad actors are finding new ways to leverage techniques such as phishing and ransomware, often using DNS...
DNSDNS SecurityDNS Security for Healthcare: Controlling Connected Devices and Protecting Patient DataOver the past few years, healthcare organizations have been rapidly moving towards connected devices and cloud, driven by digital transformation projects and accelerated by the pandemic. However, to allow operating with complete trust, cybersecurity solutions need to keep pace with...
DDIDNSWhy Using DoH is QuestionableDoH (DNS over HTTPS) is an interesting solution for securing the transport of DNS traffic up to the first resolver. But is it required? What are the drawbacks? Do we really need it? Can we trust its usage and the...
DNSDNS SecurityEnsuring Telco Service Continuity with DNS SecurityToday, the services provided by telecommunications businesses underpin every facet of our lives – from streaming video content on the move, to providing the vital connections that power the global financial sector – network service providers supply the critical infrastructures...