Skip to content

IoT

Search

Search

Categories

Categories

Topics

Topics

Sort

Sort

Fighting DDoS Attacks with Hybrid Cloud DNS

DNS security is often in the news, a notable example being due to one of the largest DDoS attacks ever disrupting the Dyn cloud DNS service. At least 150,000 compromised devices (including IoT hardware) were used by the Mirai botnet to bombard cloud-hosted DNS servers with DNS requests, taking down access to many of the Internet’s most popular services. What is important to note is that it wasn’t just cloud DNS services that were affected; the millions of users trying...

Signs It’s Time To Upgrade Your IPAM

As the technology that drives business forward evolves, so does the need for a more complex network that keeps everyone securely connected. An improved IP address management (IPAM) solution upgrade can help make it easier to build and maintain an inventory of your networks, subnets and IP addresses, and preserve the health of your network overall. A timely upgrade can help you efficiently manage this vital area of your organization. Learn more about modernizing your IPAM solution and how a...

How DNS Security Protects the Financial Industry Against Cyberattacks

For many years, the volume of sensitive customer and financial data in circulation have made the financial services sector an attractive target for attackers, and the COVID-19 pandemic has further enhanced this, creating new risks for banks, trading platforms and other financial institutions. The rapid shift to distributed and remote workforces has resulted in more complex company networks revealing weak points in IT security concepts. An increased reliance on cloud services in combination with the swift acceleration of connected devices...

How DNS Security Can Help The Very-Targeted Healthcare Industry Fight Back

The COVID-19 pandemic has placed an incredible pressure on the healthcare industry, not just in the physical world but also in the digital one. Healthcare is uniquely vulnerable to cyberattacks, particularly attacks utilizing DNS. In the 2021 Global DNS Threat Report, just released by EfficientIP and IDC, we see how threat actors are targeting the DNS of verticals such as healthcare, as well as what companies are doing about it. Why threat actors love to target healthcare Healthcare is an...

Threat Actors Have Grown Smarter in Their DNS Attacks. Here’s How Companies Should Respond…

Over the past year–during the COVID-19 pandemic–businesses have accelerated their digital transformation as the pandemic has continued to require off-premise working and online or cloud-based products and services. But digital transformation is not the only area to experience vast change during the pandemic. Our annual report with IDC reveals that attackers have changed their tactics this year, growing more diverse in their methods for abusing the DNS protocol; businesses have had to pivot to smarter methods in order to keep...

Enhancing IoT Security with DNS CQF

IoT devices are popping up every second, with many being on an organization’s network but not always under the control of I&O teams. These devices are required to be identified, inventoried, screened, managed and secured in order not to cause any problems to the rest of the IT ecosystem, the users or the organization itself. This requires tooling and processes where the DDI (DNS-DHCP-IPAM) certainly has an important role to play, in particular EfficientIP’s DNS Client Query Filtering (CQF) feature....

Application Access Control: It All Starts with DNS

Most IP communication starts with a DNS query to translate the server name contained in a URL or any application solution into an IP address. Whether it uses TCP or UDP (or any other communication protocol), and whether it uses IP version 4 or 6, the session will be established after the DNS resolution. DNS is at the intent of any application exchange, it can perform value-added actions like securing the communication, filtering predefined destination sites, optimizing the destination or...

Remote Worker Protection Using DoH

Most organizations now have remote workers and need to provide them with maximum comfort and security to perform their operations. We all know that DNS can be abused to carry out very powerful attacks, animate botnet activities, exchange data with command and control servers or for exfiltrating valuable information. Remote workers always use the public infrastructure from each ISP to connect back to the organization’s IT system and to consume SaaS or cloud services and applications. This shared and public...

Accelerating Transition to the New Normal: Top 5 Predictions for 2021

After the challenging events in 2020, the effects of the Covid pandemic will continue throughout next year, ensuring remote working & remote customers will remain in the limelight. In order to function, businesses will have no choice but to transform, both from organizational and societal viewpoints. The result will be rapid acceleration of digital transformation projects, covering key initiatives like edge computing, multi-cloud, zero-trust security, autonomous networks and infrastructure-as-code. So as organizations continue their transition to the “new normal”, here...

Ensuring Telco Service Continuity with DNS Security

Today, the services provided by telecommunications businesses underpin every facet of our lives – from streaming video content on the move, to providing the vital connections that power the global financial sector – network service providers supply the critical infrastructures we need. But the proliferation of internet traffic, driven by trends such as mobility, widespread deployment of IoT devices and customer demand for real time internet access from remote locations, has placed immense pressure on service providers to secure their...

Simplify & Secure Your Network

When our goal is to help companies face the challenges of modern infrastructures and digital transformation, actions speak louder than words.

SOLIDserver UX interface