article thumbnail

GUEST ESSAY: Addressing DNS, domain names and Certificates to improve security postures

The Last Watchdog

In 2019, we’ve seen a surge in domain name service (DNS) hijacking attempts and have relayed warnings from the U.S. In the enterprise environment, domain names, DNS, and certificates are the lifeline to any internet-based application including websites, email, apps, virtual private networks (VPNs), voice over IP (VoIP) and more.

DNS 182
article thumbnail

A Reactive Cybersecurity Strategy Is No Strategy at All

CyberSecurity Insiders

A foundational approach to cybersecurity empowers CISOs to see abnormalities and block threats before they do damage. By increasing visibility into DNS traffic, CISOs can detect, block, and respond to incidents more quickly as well as use this data to institute new controls and increase overall resiliency.

DNS 140
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Five considerations for cloud migration, from the House of Representatives CISO

SC Magazine

“It’s about how you can do your business mission” in a different environment, with its own requirements for protecting data, Vickers said during his talk at the RSA Show’s Cloud Security Alliance CISO Summit. The post Five considerations for cloud migration, from the House of Representatives CISO appeared first on SC Media.

article thumbnail

Reflections on third-party validation of HYAS capabilties

Security Boulevard

I remember when a CISO from a health care client called me to understand whether we were aligned from a moral standpoint, both as individuals, and as companies. By utilizing unique and bespoke data, assembled and correlated in the right way, HYAS has actually created the most effective Protective DNS solution on the planet.

DNS 69
article thumbnail

How do you know?

Security Boulevard

Do your DNS queries all have responses, and are they what you expected? By Charles Strauss, Senior Brand Copywriter, Corelight Can you be sure attackers aren’t hiding in your encrypted traffic? Can your investigators go back 18 months ago to find what they need? Do your alerts mean something, or nothing? How do you know? .Read Read more ».

DNS 52
article thumbnail

A roadmap for developing a secure enterprise cloud operating model

SC Magazine

Network security: Includes Direct Connect (DC) private and public interfaces; DMZ, VPC, and VNet endpoints; transit gateways; load balancers; and DNS. CISOs need to lead from the front and take an active role in the evangelization and implementation of cloud security controls under the auspices of a secure enterprise cloud operating model.

article thumbnail

Attack Surface Management for the Adoption of SaaS

CyberSecurity Insiders

Earlier this year, I had the opportunity to speak before a group of CISOs about the topic of attack surface management (ASM). DNS subdomain scanning is a useful tactic to discover internet-exposed SaaS application portals and their APIs. By Alfredo Hickman, head of information security, Obsidian Security.