DNS
Data Regulations: Time to Step up Your Data Theft Protection
Todayโs data-driven economy is being led by personal data, so naturally focus is turning more strongly to privacy and protection. New regulations have appeared over the last few years, with a rapid acceleration in regions such as North America and APAC. While itโs only fair that regulators introduce these new laws with their associated fines for data breaches, companies are still finding it extremely challenging to ensure confidentiality of their data. Cybercriminals are smart guys โ data theft and ransomware...
Use DDI to Jumpstart Network Automation in a Cisco Environment
Why Network Automation is Needed Besides economically driven reasons, digital-transformation strategies are still a prime reason to perform Network Automation in general. The main goals here are to improve efficiency and flexibility to increase productivity. The challenges aimed to be solved are in the areas of cost, visibility and change, in order to maximize return on investments. As Gartner puts it: โโฆ by 2024, organizations will lower operational costs by 30% by combining automation technologies with redesigned operational processes โฆโ...
Top 5 Network and Security Predictions for 2023
Welcome to 2023, a year that promises to be another one full of turbulence, coming back from the pandemic, and facing the current hectic economic climate and downturn which in effect brings new challenges to enterprises. They have to develop (new) resilient strategies, resist threats, improve operational efficiency and reduce costs. This is where network automation comes into play and shines. And as if this is not enough already, further continuation of adopting hybrid working, network modeling, risk mitigation, and...
How Telcos Overcome Rising DNS Attacks
Telecommunication operators control and run the critical infrastructure vital for communicating and storing large amounts of sensitive data. This makes them an obvious major target for cyber attacks, frequently using DNS as an attack vector to cause devastating impacts on internet connectivity and data confidentiality. According to a recent IDC security report, Telcos are the 2nd most targeted vertical, with 94 percent of them suffering DNS attacks. Other reports estimate each DDoS attack carried out through DNS costs over $220,000...
DNS RFCs: The Elephant in the Room โ Part 2
As stated in Part 1 of this series, DNS RFCs have a great impact on how DNS operates. It comes with a risk factor and can impact security. In this second part, we will continue to discuss the impact and provide some food for thought on how to deal with it. DNS is a clear Favorite โ Everyone, and I mean EVERYONE loves it! DNS has had more than 25 years to mature, and with that, also the bad actors that want...
Network Security for Higher Education: The Key Role of DNS
Last year, Education and Research were the top targets for cybercriminals, according to a study by Check Point. With remote learning becoming normal, bad actors are finding new ways to leverage techniques such as phishing and ransomware, often using DNS as an attack target or a vector. IDCโs 2022 Global DNS Threat Report shows that 84% of schools and universities were victims of DNS attacks in the past 12 months. The report then goes on to provide recommendations on how...
DNS RFCs: The Elephant in the Room โ Part 1
DNS goes back a long way, it is more than 25 years old and is one of the most used, attacked, and implemented protocols by far. Needless to say, it has some security implications and risks attached to it too. Most of them are well documented and discussed, but one of them seems to be overlooked: RFCs (and DRAFTS) What is an โRFCโ The Internet Engineering Task Force (IETF) maintains and has a process for approving Request-for-Comments (RFC). Solely to create internet...
DNS Security for Healthcare: Controlling Connected Devices and Protecting Patient Data
Over the past few years, healthcare organizations have been rapidly moving towards connected devices and cloud, driven by digital transformation projects and accelerated by the pandemic. However, to allow operating with complete trust, cybersecurity solutions need to keep pace with new telehealth/telemedicine technologies adopted which due to their criticality for patient health must be โalways onโ. Above all, network infrastructure needs to be reliable, connected medical devices have to be controlled in terms of what infrastructure they are allowed to...
SD-WAN: Why DDI is Key for Efficient Management
As published in a recent article in SDxCentral based on research from MEF, both the SD-WAN and SASE markets show strong revenue and activity, but they both face challenges impacting market efficiencies and growth. Letโs review the related challenges presented in the article and see how a solid DDI Solution can help mitigate these challenges and ease multi-vendor SD-WAN and integration of Security options. Challenges with SD-WAN for Service Providers and Enterprises Across the globe, 36 Service Provider experts were surveyed and the results...
How to Secure Anywhere Networking with DNS: 2022 Threat Report Highlights
As organizations adopt a โwork from anywhereโ approach, IDCโs 2022 Global DNS Threat Report confirms that the frequency and damage cost of DNS attacks have remained as high as ever, causing severe impacts on service continuity and data confidentiality for on-premises, cloud, and remote workers. On the positive side, the importance of DNS for overall network security is being increasingly acknowledged, with organizations understanding its criticality for strengthening resilience, protecting data privacy, and for providing an early security barrier by...
Simplify & Secure Your Network
When our goal is to help companies face the challenges of modern infrastructures and digital transformation, actions speak louder than words.