<p>Welcome to the Infoblox Security blog. Our Cyber intelligence team shares its experiences, thoughts and observations on various topics of interests including latest cyber attacks, malware, and the increasing use of DNS as an attack vector.</p>
by MIchael Katz, Infoblox Professional Security Sales Specialist DNS sinkholing is a very effective strategy to control access to network resources. Infoblox builds DNS sinkholes, with Infoblox DNS Firewall or Response Poicy Zones (RPZ). According to Infoblox documentation, a DNS RPZ enables you to “ define RPZ rules to…
Overview A vulnerability in the “support access” feature on Infoblox NIOS could allow a locally authenticated administrator to temporarily gain additional privileges on an affected device and perform actions within the super user scope. Description The vulnerability is due to a weakness in the “support access” password…
By Krupa Srivatsan, Infoblox Director of Product Marketing SD-WAN is an emerging solution for branch offices that enables them to directly connect to the Internet instead of always backhauling traffic through the headquarter servers. This makes it easy to establish local Internet breakouts and offers branch office users…
Security architects, SOC engineers, and response teams are increasingly moving to security workflow automation to meet the demands of new threats. It’s not enough to have a great tool to meet today’s security challenges - your tools have to work better together. The market for security automation has become so large that…
Author: Philip Parker, Infoblox Senior Technical Marketing Engineer There are many features that come as a surprise to our customers, and we've often heard, "didn't know you could do that". One of these features is Role Based Access Control (RBAC). Its intent is to allow a role based permissions model for controlled…
Author: Thomas Lee, Infoblox Technical Marketing Engineer Your enterprise has implemented two-factor authentication for all access to computer systems. In a nutshell, two-factor authentication is something you know and something you have. The ‘something you know’ can be a password. The ‘something you have’ can be a token…
Your enterprise has implemented two-factor authentication for all access to computer systems. In a nutshell, two-factor authentication is something you know and something you have. The ‘something you know’ can be a password. The ‘something you have’ can be a token card or a certificate. A cyber criminal would need both to…
It looks like you're new here. Sign in or register to get started.