How to get cloud migration right

If you want to get cloud migration right, you must deal with an inconvenient truth: Cloud or hybrid cloud environments lower the drawbridge between your data center and the internet, and that creates opportunity as well as security risk. Many enterpris… Continue reading How to get cloud migration right

For adapting to new cloud security threats, look to “old” technology

With remote work and reliance on cloud computing here to stay, it’s no surprise how many headlines there are to address the growing cloud security concerns in our industry. While there is a time and place for onboarding additional cloud security soluti… Continue reading For adapting to new cloud security threats, look to “old” technology

Risky business: 3 timeless approaches to reduce security risk in 2021

Since the COVID-19 pandemic drove workforces home, we’ve seen an increase in security risk across the board: from an increase in phishing and spear phishing attacks to an increase in reliance on third-party DNS-over-HTTPS resolver use and sophisticated… Continue reading Risky business: 3 timeless approaches to reduce security risk in 2021

BlueCat Adaptive DNS gives network teams visibility over AWS resources and threat protection

BlueCat announced enhancements to its Adaptive DNS platform that give businesses coping with sudden and profound changes in their network greater control, visibility, and agility using DNS, DHCP and IP address Management (DDI). These new capabilities e… Continue reading BlueCat Adaptive DNS gives network teams visibility over AWS resources and threat protection

DNS over HTTPS’ threat to enterprise security

DNS over HTTPS (DoH) is here, regardless who likes it or not. Unfortunately, a majority of guidance surrounding DoH is centered around individual consumer perspectives. For enterprise security leaders looking to manage the risks of DoH, that hasn’t bee… Continue reading DNS over HTTPS’ threat to enterprise security

How to start achieving visibility in the cloud

As a security executive, you have a curious gig. On one hand, you’re responsible for securing your organization across multiple systems, networks, clouds, and geographies. On the other, your team owns none of those things. Organizing resources in a way… Continue reading How to start achieving visibility in the cloud

How DNS firewalls can burn security teams

It’s easy to see how DNS firewalls could have thwarted 33% of data breaches. For most IT and security teams, DNS has been an afterthought. Or, worse, not even that. The research, conducted by the Global Cyber Alliance, was absolutely still worth doing…. Continue reading How DNS firewalls can burn security teams

How internal dysfunction puts your network at risk

IDG polled 200 network and cybersecurity professionals across the U.S. & Canada, and found almost inevitable consequences for organizations where network and cybersecurity teams have conflicting objectives, are managed in a siloed way, and have un… Continue reading How internal dysfunction puts your network at risk