Skip to content

DNS Tunneling

Search

Search

Categories

Categories

Topics

Topics

Sort

Sort

May 25th 2018 is imminent: Are you ready for GDPR?

Officially on May 25, 2018, the General Data Protection Regulation (GDPR) will protect data related to citizens of the European Union, anywhere in the world. It adds strict rules for breaches and possible penalties of up to four percent of turnover and requires notification to the supervisory authority within 72 hours of breach occurring. The regulation has been framed around the location of the data subject, rather than the data controller or data processor, meaning this EU regulation has global...

Ensuring GDPR Compliance by Preventing DNS Exfiltration

The implementation of the EU’s new General Data Protection Regulation (GDPR) is now a bit more than a year away. It’s a wide-reaching set of rules which you must comply with if you’re holding data about European citizens. Compliance doesn’t need to be difficult though, as much of GDPR is focused on how you handle data loss and network breaches. To avoid catastrophic fines after breaches, the easiest way to become compliant is simple: you need to enhance your security....

Public Sector Network Security: A Race Against Time

As we move more and more of our government-citizen interactions online, making sure we have access to those services becomes increasingly important. After all, we don’t want to be collateral victims of a DDoS attack on a government server just as we’re trying to submit our tax returns. Even more important is ensuring the personal information that the public sector (both local and national government) stores is secure. Databases of government-held information are the most worrying, whether they’re run by...

2016 Report – The Global DNS Threat Survey

This year, EfficientIP pioneered the largest independent survey on DNS services and their importance in IT security attacks so far undertaken in the industry. Nearly 1,000 respondents have helped us better understand the technical and behavioral causes for the rise in DNS vulnerabilities and attacks, and the effects on businesses. The survey proves DNS servers have become much more exploited than ever, and hackers often owe their ‘success’ to weak DNS defenses that no longer suit the needs of a...

Using DNS To Protect Your Intellectual Property

A typical network intrusion isn’t a smash-and-grab raid. It’s a long slow process, where an intruder can spend weeks or months exploring a network before slowly copying the data they want. Perhaps they’re stealing your customer data, including credit cards and personal information, or perhaps they’re after your intellectual property. But how do they get that data out of your network? Most intrusion detection software looks at the obvious patterns of data exfiltration: over HTTP connections and through FTP. This...

Simplify & Secure Your Network

When our goal is to help companies face the challenges of modern infrastructures and digital transformation, actions speak louder than words.

SOLIDserver UX interface