The Worst DNS Attacks

The Domain Name System (DNS) vies with the Border Gateway Protocol (BGP) for the title of “Achilles heel of the internet.” If you want to take down large swathes of the internet in a single event, DNS and/or BGP are how you’d go about it. Over the past few decades, there have been innumerable security … Read moreThe Worst DNS Attacks

DNS Over HTTPS: Why, How, When, and What Is It, Exactly?

DNS, the old standby of name resolution protocols, has been with us for a long time and will be for a long time to come. But like any “old standby” protocol, DNS has some imperfections. Like many early internet protocols, DNS was designed with an almost total lack of security. Finding an IP address via … Read moreDNS Over HTTPS: Why, How, When, and What Is It, Exactly?

10 Best SIEM Tools in 2019

SIEM solutions are a crucial part of log management and comprehensive security. For businesses looking to add to or upgrade their solutions, here is the best SIEM tools list for 2019. Security information and event management, or SIEM, provides insights into a corporate IT environment through functions like log management and security information management. Just … Read more10 Best SIEM Tools in 2019

How to Stop, Prevent, and Protect Yourself from a DDoS Attack in 2019

Distributed denial-of-service (DDoS) attacks are increasingly becoming a problem for global companies that have a significant portion of their business online. Knowing how to stop a DDoS attack is vitally important, especially considering that it can cost a business significantly in lost revenue. This might mean employing protection tools — my personal pick is Security … Read moreHow to Stop, Prevent, and Protect Yourself from a DDoS Attack in 2019

Introduction to SAP: Everything Beginners Need to Know about SAP Security

SAP security is a technical module that works within SAP systems to allow access where it’s needed and prevent access where it’s not. Establishing good internal security and access processes is a vital part of helping ensure your SAP system is protected and will function well. Protecting against external threats is important, but internal threats … Read moreIntroduction to SAP: Everything Beginners Need to Know about SAP Security

Exploring the Use of DNS in Multi-Cloud Environments

The multi-cloud approach to modern IT means workloads—whether virtual machines, containers, or minimal applications—can be located on any one of multiple independent infrastructures; whether running simultaneously for fault-tolerance or when being moved between these. In a modern IT deployment, workloads can (and will) regularly move between cloud and onsite deployments, whether for price, maintenance, latency, or … Read moreExploring the Use of DNS in Multi-Cloud Environments

DNS, Regulatory Compliance, and You

The European Union’s General Data Protection Regulation (GDPR), one of the most rigorous pieces of privacy legislation to date, has become almost synonymous with data privacy. This is partly due to its broad scope. The GDPR applies to any organization collecting and processing the data of an EU citizen—even if the organization isn’t based in … Read moreDNS, Regulatory Compliance, and You