Share this
GigaOM Radar for Domain Name System (DNS) Security
by DNSFilter Team on Feb 29, 2024 12:40:00 PM
The domain name system (DNS) is fundamental to every modern organization. It’s the backbone of communications and the means by which clients connect with services both internally and externally. It is a service so fundamental to the basic day-to-day operations of every network that it must be both ultra-secure and resilient. However, the reality is that it is not. In fact, the DNS is vulnerable. Attacks of all types that can undermine the DNS, such as cache poisoning, DNS hijacking, amplification, spoofing, and tunneling, continue to increase.
The impact of a DNS cyberattack on an enterprise can be devastating. It can result in the loss of sensitive data, deployment of malicious code, and denial of access to key services, all of which can result in significant financial losses and reputational damage. Protecting DNS should be a priority, and that means using a solution with a range of security capabilities. A good DNS security solution has a unique value in the overall security chain. This stems from its operation early in the communications process. The vast majority of malicious activity in an infrastructure will make a DNS call; by securing and identifying malicious calls at inception, proactive security can be implemented from the beginning of an attack, helping secure an organization more effectively.
Share this
Categories

At the scale of the Internet, threats are relentless. Domain Name System (DNS) technology is over 40 years old, but it remains just as relevant today—if not more so—to help organizations stay secure from malicious threats. What most people don’t know is that more than 70% of attacks involve the DNS layer. Every malicious request blocked represents a real attack prevented, real harm avoided, and real people protected. This underscores the power of...

Cybersecurity experts expect a significant surge in tax-related scams in the final month before Tax Day.

There's a contradiction in cybersecurity: humans can be both the weakest link and the strongest. For instance, humans are highly susceptible to deception. This is an age-old problem; look no further than the Trojan Horse of Greek lore or the Ghost Army of World War II. In the latter case, Allied forces created inflatable tanks and faked radio traffic, among other deceptive tactics across Europe, to confuse, distract and divert enemy forces and sa...