DNS SecurityHow DNS Security Helps Combat RansomwareEveryone knows that Ransomware has become costly as attacks target organizations in every industry vertical. Governments, the private sector, and critical infrastructure owners face intolerable data, financial, and reputational losses with seemingly no way to stop it. But perhaps weโre...
DNS SecurityData Theft via DNS – Are You Safe?With cybercriminals using increasingly sophisticated mechanisms, and insider threats still prevalent, organizations have come to accept that the threat of a data breach is here to stay. Rather than wondering โifโ my business will become a victim of data theft...
Privacy LawsData Regulations: Time to Step up Your Data Theft ProtectionTodayโs data-driven economy is being led by personal data, so naturally focus is turning more strongly to privacy and protection. New regulations have appeared over the last few years, with a rapid acceleration in regions such as North America and...
DNSDNS SecurityDNS Security for Healthcare: Controlling Connected Devices and Protecting Patient DataOver the past few years, healthcare organizations have been rapidly moving towards connected devices and cloud, driven by digital transformation projects and accelerated by the pandemic. However, to allow operating with complete trust, cybersecurity solutions need to keep pace with...
DNSDNS SecurityCybersquatting: The Basics Part 1 – Strategies and Attack TypesDNS is no longer just a name resolution system to make our lives easier in the day-to-day use of applications. It now plays an important role in the various techniques used by attackers. We know about the “Protocol abuse” attacks,...
DNSDNS SecurityAugmenting Zero Trust: Why Using DNS Allow Lists is a No-BrainerYou canโt control what you canโt see, as the saying goes. One of the main pillars of Zero Trust Foundations is Granular Visibility and Control on the traffic. This means being able to differentiate the sources of the traffic (microsegmentation)...