DNS Protection: A "Must" in Security Solutions for any Company

DNS is a critical element for all companies because it turns domain names into internet protocol (IP) addresses. Cyber criminals have been digging into DNS in order to create new threats. DNS exfiltration is a typical attack that can become a terrible problem for a company; especially because these attacks (if used to encrypt traffic or use DNS tunneling), are very difficult to detect, and can permeate a network for long time, causing information theft that can compromise the company. Due to this exfiltration of data, a company can run into legal problems or acquire a bad reputation in the sector. Thus, the resulting issues can be very serious. If a DNS exfiltration or any other DNS attack is not detected properly, or at the beginning of the infection vector, consequences can be dire. Continue reading DNS Protection: A "Must" in Security Solutions for any Company

Trust As The Foundation Of Security

Our customers are moving more workloads to the cloud. No surprise there. The siren song of agility, scale, and cost savings can’t be resisted. But as we highlighted earlier, security fundamentals are key to a successful cloud migration. In fact, we also shared marketectures to successfully migrate apps to the cloud and the top best practices for securing cloud workloads. While there are plenty of areas to dive into across how temporary is the new permanent, why RTFM is always relevant, and why understanding the shared responsibility model is key to any eyes wide open cloud migration, today I am going to focus on my favorite: digital trust. Continue reading Trust As The Foundation Of Security

Securing Your Direct Internet Access Connections

But now, with more traffic destined for SaaS applications and the public web, enterprises are increasingly adopting the Internet as the corporate network. Instead of sending SaaS or web traffic over the WAN, Direct Internet Access (DIA) simply sends that traffic out over a standard broadband connection. An alternative approach is for the enterprise to deploy an SD-WAN. Continue reading Securing Your Direct Internet Access Connections