article thumbnail

RSAC Fireside Chat: Rich threat intel, specialized graph database fuel HYAS’ Protective DNS

The Last Watchdog

Related: Selecting a Protective DNS One smart way to do this is by keeping an eagle eye out for rogue command and control (C2) server communications. And this beaconing must intersect with the Domain Name System (DNS.) DNS security and the overall Protective DNS space is rising in importance.

DNS 147
article thumbnail

Implementing Zero Trust: Beyond Internal Network Models

Security Boulevard

Are you similarly asking the same questions — for each connection that originates inside your network and tries to talk to a remote piece of Internet infrastructure outside your network, why are we talking to it, who is it really, and should we be talking to it? That’s the role of Protective DNS.

DNS 64
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA, SolarWinds up interest in security scoring

SC Magazine

Sachin Bansal, general counsel at SecurityScorecard, spoke with SC Media about ratings, and how they can be used to strengthen the supply chain, determine cyber insurance premiums and as an investigative tool for an oversight body. These scores are updated every day because the internet changes every day.

article thumbnail

The winding road to compliance

Malwarebytes

Then there are the expanded values gained from compliance, such as assurances you can provide to executives and Boards about the organization’s cybersecurity posture, or your improved stance for cyber insurance.

DNS 73
article thumbnail

Why 83 Percent of Large Companies Are Vulnerable to This Basic Domain Hack

Adam Levin

A whopping 97 percent failed to use DNSSEC , a domain security protocol designed to address core vulnerabilities in the foundations of the internet itself. More than half of the companies surveyed used retail-grade registrars, which typically provide less in the way of security safeguards and training than enterprise-grade registrars.

Hacking 130