The role DNS plays in network security

New EfficientIP and IDC research sheds light on the frequency of the different types of DNS attack and the associated costs for the last year throughout the COVID-19 pandemic. In the United Kingdom, the damages stemming from each attack saw a marked de… Continue reading The role DNS plays in network security

Edge DNS Secondary Implementation: Order of Operations for NS Zone and Registrar Records

Akamai Edge DNS service delivers edge-based, authoritative domain services for thousands of organizations. These organizations trust Edge DNS to deliver reliable and performant responses, reflected by a 100% uptime service-level agreement. Along with u… Continue reading Edge DNS Secondary Implementation: Order of Operations for NS Zone and Registrar Records

Edge DNS Secondary Implementation: Order of Operations for NS Zone and Registrar Records

Akamai Edge DNS service delivers edge-based, authoritative domain services for thousands of organizations. These organizations trust Edge DNS to deliver reliable and performant responses, reflected by a 100% uptime service-level agreement. Along with unmatched reliability, Edge DNS boasts an impressive geographically diverse footprint and an intelligently deployed anycast network, ensuring client queries are consistently routed to a nearby nameserver in an efficient manner. From an operations perspective, Akamai offers administrators the flexibility to leverage Edge DNS as either a secondary or primary provider, as well as the option of implementing DNSSEC to protect against DNS forgery and manipulation. Continue reading Edge DNS Secondary Implementation: Order of Operations for NS Zone and Registrar Records

Verifying that no malicious certificate has been issued while a DNS record was pointing to an uncontrolled IP

Given the scenario that:

Victim rents VM1 from a cloud provider, and points his/her DNS record to that VM1’s IP address
Victim deletes VM1 and switches to a different cloud provider, and creates VM2 there, but forgets to modify the DNS re… Continue reading Verifying that no malicious certificate has been issued while a DNS record was pointing to an uncontrolled IP

NAME:WRECK DNS Bugs: What You Need to Know

For most internet users, there’s not much of a perceivable difference between the domain name they want to visit and the server that the domain queries. That’s because the Domain Name System (DNS) protocol does a good job of seamlessly routing users to… Continue reading NAME:WRECK DNS Bugs: What You Need to Know