DNSDNS SecurityNetwork AutomationHow to Enhance Threat Intelligence with Newly Observed DomainsDomain names life cycle… Domain names are used as a way to abstract the location of the related application or...
DHCPDNSDNS SecurityIPAMEnhancing IoT Security with DNS CQFIoT devices are popping up every second, with many being on an organization’s network but not always under the control...
DNSDNS SecurityApplication Access Control: It All Starts with DNSMost IP communication starts with a DNS query to translate the server name contained in a URL or any application...
DNSDNS SecurityRemote Worker Protection Using DoHMost organizations now have remote workers and need to provide them with maximum comfort and security to perform their operations....
DNSWhy Using DoH is QuestionableDoH (DNS over HTTPS) is an interesting solution for securing the transport of DNS traffic up to the first resolver....
Application Traffic RoutingDNS SecurityNetwork AutomationVirtualization & CloudPredictions 2020: Networks and IT Biggest ImpactsFrom 5G driving SDN and NFV, to exploding enterprise apps, edge computing, connected hybrid clouds and, of course, cybersecurity, the...
DNSDNS SecurityVirtualization & Cloud2019: The Year That Saw Cost Per DNS Attack Soar Past $1MFor organizations globally, across all industries, cybersecurity was once more one of the hottest topics of the year. The SonicWall...
DNSDNS SecurityWhy Protecting DNS Requires More Than Firewalls(This week’s blog article was originally published in March 2017, but still rings true today). Way back when, in the...
DNSDNS SecurityData Driven Network Security with Machine LearningToday’s threats are sophisticated, malware deploys a long time prior to activation using complex command and control mechanisms, and theft...
DNSDNS SecurityZero Trust: Verifying beyond perimeters, DNS security is keyZero trust architecture is a paradigm focusing on a client rather than networks. It can be complex to set up,...