Skip to content

Malware

Data Regulations 2020: Time to Step up Your Data Theft Protection

Today’s data-driven economy is being led by personal data, so naturally focus is turning more strongly to privacy and protection. New regulations have appeared over the last few years, but 2020 will see a rapid acceleration, particularly in regions such as America and APAC. While it’s only fair that regulators introduce these new laws with their associated fines for data breaches, companies are still finding it extremely challenging to ensure confidentiality of their data. Cybercriminals are smart guys – data...

Predictions 2020: Networks and IT Biggest Impacts

From 5G driving SDN and NFV, to exploding enterprise apps, edge computing, connected hybrid clouds and, of course, cybersecurity, the new decade in 2020 promises to be very eventful for network and security managers across the globe. Here are our predictions for the top five trends that will shape technology and the networks industry in the coming year. 1. Infrastructure will move closer to the edge Progressing towards multiple clouds is a really smart move. It helps ease digital transformation...

2019: The Year That Saw Cost Per DNS Attack Soar Past $1M

For organizations globally, across all industries, cybersecurity was once more one of the hottest topics of the year. The SonicWall report states that in just the first nine months 7.2 billion malware attacks were launched, with IoT malware worryingly increasing by 33% to 25 million. As the frequency of attacks continued to increase, DNS remained a favorite target, as well as an attack vector (91% of malware are using DNS). The IDC 2019 Global DNS Threat Report revealed 82% of...

Why Protecting DNS Requires More Than Firewalls

(This week’s blog article was originally published in March 2017, but still rings true today). Way back when, in the early days of the Internet, all we needed to protect our systems was a firewall. You’d set up a Nokia box or a Cisco PIX, enable a few rules, and walk away, safe in the knowledge that your servers and services were protected. But the world has changed, and despite the hard work of the firewall vendors, the threat landscape...

Why You Shouldn’t Rush Into DoH

While being a core component of the Internet, DNS remains one of the least secure protocols in active use. DNS security is a long-standing debate, with DNS privacy a much more recent matter and a source of division among the security community. Indeed, privacy matters and must weigh in the balance when considering DNS security. However, security is not only about confidentiality. Protocols such as DNS over TLS or DND over HTTPS must be leveraged wisely to strengthen network security,...

Data Driven Network Security with Machine Learning

Today’s threats are sophisticated, malware deploys a long time prior to activation using complex command and control mechanisms, and theft of data and personal information is a strong motivation for hackers. In this context, DNS traffic plays a vital role in enterprise network security since it offers the possibility of seeing the intent of most traffic, whether it is legitimate or not. Countermeasures based on DNS provide an opportunity to filter a lot of malicious traffic, but DNS security requires...

Zero Trust: Verifying beyond perimeters, DNS security is key

Zero trust architecture is a paradigm focusing on a client rather than networks. It can be complex to set up, but a first simple step is possible with an appropriate DNS security solution. Perimeter security is not enough Most enterprise networks are based on security topology separating the internal and the external networks. The internal where the users are located, and the external which connects to the Internet and partners. Most of the time, intermediate zones are built to allow...

Public Cloud Platforms Are Not Waterproof

Digital transformation is eased by cloud infrastructures Many organizations are starting their journey to the cloud by moving some workloads to public providers. Most of the time, the first ones are development and test environments as they are generally considered less critical. Moving to production is performed after this initiation on non-critical front applications, sometimes including storage as files and databases. Then come bigger deployments. Common strategy starts with “lift & shift” of existing eligible applications to public cloud compute...

DNS Threat Intelligence for SOC: How It Needs to be Built

Extreme diversity and growth of menaces, together with increasing network complexity, is making it very challenging for today’s security managers to identify suspicious activity. They require knowledge of a threat’s capabilities, resources, motives, and goals – a combination commonly referred to as threat intelligence. As confirmed by Gartner, this knowledge helps organizations and SOCs perform a more thorough analysis and make informed decisions on how to respond and react to any particular threat. So as part of their overall network...

IT and Networks 2019: Prediction of Biggest Impacts

2019 is here, so it’s time to look closer at what this year will bring for network management, IT digital transformation and cybersecurity. What recent trends will plant their feet and stand firm? What overhyped buzzwords will prove to have no substance? And, importantly, what actions will organizations take from the multiple cyber attacks which dominated 2018? From network automation and SDN taking off, to the reappearance of zero trust and the continuous impact of current GDPR regulations, here we...

Simplify & Secure Your Network

When our goal is to help companies face the challenges of modern infrastructures and digital transformation, actions speak louder than words.

SOLIDserver UX interface