DNS SecurityGDPRPrivacy LawsMay 25th 2018 is imminent: Are you ready for GDPR?Officially on May 25, 2018, the General Data Protection Regulation (GDPR) will protect data related to citizens of the European Union, anywhere in the world. It adds strict rules for breaches and possible penalties of up to four percent of turnover and requires notification to the supervisory authority within 72 hours of breach occurring. The regulation has been framed around the location of the data subject, rather than the data controller or data processor, meaning this EU regulation has global...
DNS SecurityGDPRPrivacy LawsEnsuring GDPR Compliance by Preventing DNS ExfiltrationThe implementation of the EU’s new General Data Protection Regulation (GDPR) is now a bit more than a year away. It’s a wide-reaching set of rules which you must comply with if you’re holding data about European citizens. Compliance doesn’t need to be difficult though, as much of GDPR is focused on how you handle data loss and network breaches. To avoid catastrophic fines after breaches, the easiest way to become compliant is simple: you need to enhance your security....
DNS SecurityPublic Sector Network Security: A Race Against TimeAs we move more and more of our government-citizen interactions online, making sure we have access to those services becomes increasingly important. After all, we don’t want to be collateral victims of a DDoS attack on a government server just as we’re trying to submit our tax returns. Even more important is ensuring the personal information that the public sector (both local and national government) stores is secure. Databases of government-held information are the most worrying, whether they’re run by...
DNS Security2016 Report – The Global DNS Threat SurveyThis year, EfficientIP pioneered the largest independent survey on DNS services and their importance in IT security attacks so far undertaken in the industry. Nearly 1,000 respondents have helped us better understand the technical and behavioral causes for the rise in DNS vulnerabilities and attacks, and the effects on businesses. The survey proves DNS servers have become much more exploited than ever, and hackers often owe their ‘success’ to weak DNS defenses that no longer suit the needs of a...
DNSDNS SecurityUsing DNS To Protect Your Intellectual PropertyA typical network intrusion isn’t a smash-and-grab raid. It’s a long slow process, where an intruder can spend weeks or months exploring a network before slowly copying the data they want. Perhaps they’re stealing your customer data, including credit cards and personal information, or perhaps they’re after your intellectual property. But how do they get that data out of your network? Most intrusion detection software looks at the obvious patterns of data exfiltration: over HTTP connections and through FTP. This...