When June arrives in the United Kingdom, that means it's time for the annual Infosecurity Europe conference in London. Here are visual highlights from this year's event, which featured 240 sessions, 400 exhibitors and an estimated 19,500 attendees.
While many organizations have adopted a defense-in-depth strategy, most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses.
But this infrastructure doesn't have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can...
Although every action on the Internet relies on the Domain Name System (DNS), many organizations fail to install corresponding safeguards.
Download this whitepaper and learn why:
Malicious actors have evolved their methods to leverage the vulnerabilities of recursive DNS
Attacks that utilize this vector are...
Cybercriminals are using the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing attacks, malware and ransomware campaigns, and data exfiltration against companies. How are you proactively protecting your network and users from these targeted threats?
Download this whitepaper...
Malicious actors are increasingly utilizing the recursive DNS infrastructure to launch damaging phishing attacks, malware and ransomware campaigns, and data exfiltration against companies.
Proactively protecting your company against such threats at the DNS control-point, as opposed to retroactive triage and...
Traditional hub-and-spoke networking architectures, and the castle-and-moat security they utilize, aren't amenable for today's burgeoning cloud-and-mobile world.
A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you...
A recent analyst report stated 80% of respondents confirmed the use of Web Application Firewalls (WAFs) to protect public-facing websites and applications, but most have remained frustrated, disappointed, and concerned that their WAFs may not be covering all of their security requirements. Your basic and/or outdated...
Hackers have reportedly demanded a ransom from Bank of Montreal and Simplii Financial in exchange for not dumping 90,000 customers' account details on a fraud forum. The FBI says online extortion and ransomware remain the top two types of cybercrime it's seeing today.
John Gammell of New Mexico has been sentenced to serve 15 years in prison for launching DDoS attacks against prior employers and business competitors, as well as for being a convicted felon in possession of firearms.
What are the risks and damages from DDoS and web application attacks? How have DDoS attacks changed? What motivates web application attackers?
Download this infographic to learn the answers to these questions and more.
Web application and denial of service attacks have caused revenue losses stemming from customer-facing services being unavailable to increase from an average of $517.6 million in 2015 to $731.6 million in 2017.
Download this report with exclusive insights on web app and denial of service attacks and learn...
DDoS attacks are morphing from being political statements to a diversion while other forms of attacks are occurring, says Arbor Network's Mike Boose, who describes new threat vectors and best practices for mitigation.
Police have taken down Webstresser, a leading stresser/booter service tied to 4 million on-demand DDoS attacks, which could be used for as little as $15 per month. Six of the site's administrators have been arrested, as have some of the site's top users, authorities say.
The cyber threat landscape is dynamic and accelerating. These DNS best practices, when coupled with an enterprise threat protection service, will aid you in identifying, blocking, and mitigating advanced, targeted threats.