DDIDNSDNS Security3 Ways To Rethink and Simplify Telecom DNSCyber-attacks and data leaks among telecommunication providers are a hot topic, especially after the DNS DDoS attack on UK’s ISP TalkTalk in October 2015. Four million customers were informed their sensitive personal information, including bank details, may have been stolen by hackers. Cyber attacks are now clearly strategic threats for telcos, many of whom have fundamental issues related to the modernization of their core systems which have often evolved as the result of several merges and often not robust enough...
DNSDNS SecurityUsing DNS To Protect Your Intellectual PropertyA typical network intrusion isn’t a smash-and-grab raid. It’s a long slow process, where an intruder can spend weeks or months exploring a network before slowly copying the data they want. Perhaps they’re stealing your customer data, including credit cards and personal information, or perhaps they’re after your intellectual property. But how do they get that data out of your network? Most intrusion detection software looks at the obvious patterns of data exfiltration: over HTTP connections and through FTP. This...
DDIDNSDNS SecuritySecurity Protection Through Hybrid DNSThe more we use the internet, the more important DNS becomes. For such an important service it’s odd that DNS is virtually invisible. We rely on it for everything, but we don’t treat it like an essential service; instead we set it up and ignore it. DNS is far too important to be left alone. You need to manage it carefully, building a DNS architecture that scales and is secure. That last part is the hardest, and the most important....