DDIIPAMNetwork AutomationSimplify SDN Deployments of User Networks with End-to-End AutomationAccess networks are evolving as enablers of digital transformation In these times of digital transformation and cloud migration that tend to lower the workload in enterprise-owned datacenters, there is one topic on which network teams are putting strong focus: the access network. Deploying an access network is still challenging nowadays. It requires preparation time, configuring equipments and services, manipulating multiple technologies, and coordinating with other teams. All these actions imply major delays. Viewed from other business lines in the enterprise,...
DNSDNS SecurityPrivacy LawsTelcos Have Everything to Lose from DNS AttacksLast month, telco service provider O2’s service went down across the UK. Users were unable to make calls, texts, or surf the internet. The outage lasted just 40 minutes as priority repairs were made. However, thousands of angry tweets were sent to the company in a scene that caused the company damage to its reputation. O2 is not likely to forget this, and neither will its customers, both existing and those that could have been. The cause of this particular...
DNS SecurityFinance Firms Losing the Most in Battle Against DNS AttacksSome of the world’s largest banks, including Santander, Lloyds Banking Group and HSBC, were targeted by DDoS-for-hire cyber attack website Webstresser last year, which attempted to launch DDoS attacks on their systems. These attacks cost some institutions hundreds of thousands of dollars. DDoS attacks, which seek to exploit the functionality of accessible DNS resolvers, rendering the server and its surrounding infrastructure useless, are a daily headache for many businesses, but the financial sector feels the sting more than most. EfficientIP’s...
DNSDNS SecuritySecure Your Network with DNS: Episode 3 – Ensuring Security Through IntegrityThis blog is the third of four episodes which help describe best practices for utilizing DNS to protect your overall network. End users most likely don’t care much about the domain name resolution process. It simply works – otherwise they feel their internet connection is broken. Yet, DNS is the key component of their network directing them to the service/content they expect to reach. But could they detect a trap if they were being routed by a fake traffic officer?...
DDIDNSDNS SecurityUniversities Need to be Schooled in DNSEducators have a lot to learn when it comes to cyber security. Domain Name System (DNS) threats are not just limited to banks and logistic multinationals anymore. Universities and academic institutions are capturing the attention of fast-learning cyber criminals for three reasons: they deal with sensitive data, they are populated by carefree students and they tend to have smaller IT budgets than com/universities-dns/mercial organizations. EfficientIP’s 2018 Global DNS Threat Report highlighted cost per DNS-based attack soared 68% to $690,000 in...
DNSDNS SecurityAPAC Businesses Need to Give DNS More Tender Loving CareThe US is undoubtedly home to some of the world’s most valuable tech companies and is worthy of wearing the tech crown. However, the Asia Pacific region (APAC) is often seen as the fastest growing tech market in the world, and some of its innovations and investments are becoming large enough to make even the US goliaths tremble. The APAC market is expected to grow at 6% this year according to Forrester, with India taking the lead. The region is...
DNS SecurityHow to Overcome SIEM Limitations for Network SecuritySIEM technology has been in existence for more than a decade, providing consolidated security reports from correlated event logs, often in order to achieve compliance with security standards. But SIEM can do better, by leveraging correlated security events to trigger alerts and appropriate reaction from SOC (Security Operations Center) teams. Effective SIEM deployment benefits from all specialized network security components. Just like a manager delegating tasks to expert members of its team, the SIEM should delegate part of the analysis...
DNSDNS SecurityEuropean businesses must work harder to keep DNS protectedEuropean organizations seem somewhat neglectful of their data. Perhaps the first thing that comes to mind, is British firm Cambridge Analytica, who misused 87 million Facebook users’ data. How businesses value customer data is reflected in not only how they use that data, but what they do to protect themselves from breaches to their networks. Compromising the DNS is a popular way to exfiltrate data out of an organization. So, what steps are businesses taking to secure their networks? In...
DNSDNS SecurityGDPRProtect your DNS, protect your dataFor the past four years, the DNS Global Threat Report created from Coleman Parkes survey data explored the technical causes and behavioral responses of Domain Name System (DNS) threats and their potential effects on businesses globally. This year, our report found an increase in the number and cost of DNS-based attacks on businesses globally, as well as a failure from organizations to adapt security solutions to protect against these new, network-based attacks that aim to exploit DNS security. While the...
DNSDNS SecurityData Theft: Why Firewalls Alone Cannot Protect YouWho nowadays is not worried their data will be used without their permission? Recent major data breaches, from Equifax to Facebook have accentuated consumer fears, and the introduction of data protection laws across all continents (GDPR in Europe, for example) are stressing out Data Protection Officers. The one bright light is that enterprises are finally realizing that legacy systems alone are inadequate for preventing data theft, and so are turning to more holistic approaches involving, in particular, innovative solutions offering...