Skip to content

Phishing

Europe Opens Up Its Wallet for DNS Attack Cost

2019 marks another year of hikes in the DNS attacks experienced by organizations, as well as the cost of them. Hackers are also changing up the tactics they use to break into their favorite company websites. European organizations might have a number of options for protecting themselves in the future, zero trust among them, but will it be enough to stop those tooled up and scrappy hackers? More attacks, but some more popular than others Four in five, 82% of...

Zero Trust: Verifying beyond perimeters, DNS security is key

Zero trust architecture is a paradigm focusing on a client rather than networks. It can be complex to set up, but a first simple step is possible with an appropriate DNS security solution. Perimeter security is not enough Most enterprise networks are based on security topology separating the internal and the external networks. The internal where the users are located, and the external which connects to the Internet and partners. Most of the time, intermediate zones are built to allow...

Web Proxy: Understanding Why It Is Not Enough

Web proxies are designed as intermediary layers between clients and applications, to accelerate surfing as well as securing communications and data. While this layer focuses on all aspects of HTTP(s), it still relies on DNS service in order to retrieve resources within a web page. Indeed, the host part of a URL is a plain name meant to be resolved to an IP address. The proxy then connects to this IP address to fetch the desired object. On the other...

Secure Your Network with DNS: Episode 4 – How DNS Contributes to Global Network Security

This blog is the final of four episodes which help describe best practices for utilizing DNS to protect your overall network. The DNS is the very core of the Internet, it has been routing traffic from client devices to applicative endpoints over the IP network for decades. Yet, it’s only recently that security people seriously started looking at this component of the network as a legitimate part of the security ecosystem. For what could have been obvious, the fact is...

Banking on Asia Pacific Financial Services’ DNS Security in a Digital Area

This week’s blog comes to us from our very own Nick Itta, VP Sales APAC. Ten years ago, the world was rocked by a financial crisis that prompted economic cataclysm. Today, financial institutions are challenged by a new set of risks and considerations standing at the forefront of the Fourth Industrial Revolution. Indeed, their greatest risks are no longer solely the consequences of poor policy or politics. One of the biggest risks facing our financial institutions – and global economy...

Universities Need to be Schooled in DNS

Educators have a lot to learn when it comes to cyber security. Domain Name System (DNS) threats are not just limited to banks and logistic multinationals anymore. Universities and academic institutions are capturing the attention of fast-learning cyber criminals for three reasons: they deal with sensitive data, they are populated by carefree students and they tend to have smaller IT budgets than com/universities-dns/mercial organizations. EfficientIP’s 2018 Global DNS Threat Report highlighted cost per DNS-based attack soared 68% to $690,000 in...

North American Businesses Aware of DNS Threats in 2018, But Not How to Mitigate Them

This is the third installment in a series of regional explorations into the network threat landscape in 2018. After Europe and Asia-Pacific (APAC), we are examining the state of North American DNS security, looking at the results for this region where EfficientIP interviewed 300 different companies, as part of its annual Global DNS Threat Report. 2018 – A year of awakening to cyber threats Cyber attacks from Russia, and high-profile attacks last year forced American and Canadian businesses to up...

APAC Businesses Need to Give DNS More Tender Loving Care

The US is undoubtedly home to some of the world’s most valuable tech companies and is worthy of wearing the tech crown. However, the Asia Pacific region (APAC) is often seen as the fastest growing tech market in the world, and some of its innovations and investments are becoming large enough to make even the US goliaths tremble. The APAC market is expected to grow at 6% this year according to Forrester, with India taking the lead. The region is...

How to Overcome SIEM Limitations for Network Security

SIEM technology has been in existence for more than a decade, providing consolidated security reports from correlated event logs, often in order to achieve compliance with security standards. But SIEM can do better, by leveraging correlated security events to trigger alerts and appropriate reaction from SOC (Security Operations Center) teams. Effective SIEM deployment benefits from all specialized network security components. Just like a manager delegating tasks to expert members of its team, the SIEM should delegate part of the analysis...

European businesses must work harder to keep DNS protected

European organizations seem somewhat neglectful of their data. Perhaps the first thing that comes to mind, is British firm Cambridge Analytica, who misused 87 million Facebook users’ data. How businesses value customer data is reflected in not only how they use that data, but what they do to protect themselves from breaches to their networks. Compromising the DNS is a popular way to exfiltrate data out of an organization. So, what steps are businesses taking to secure their networks? In...

Simplify & Secure Your Network

When our goal is to help companies face the challenges of modern infrastructures and digital transformation, actions speak louder than words.

SOLIDserver UX interface