-
Infoblox for the Security Analyst Part 1: Why INTERNAL DNS Matters to the Security Analyst
by Michael Katz, Security Sales Specialist at Infoblox This post stems from the many discussions I have had with the information security teams at Infoblox, customers, and prospects. The Infoblox Grid is an incredible tool for Information Security teams, but with so many shiny security products, it’s easy to miss the…
-
What Makes the Infoblox Security EcoSystem so Powerful?
Infoblox Security EcoSystem was designed to support responses to attacks that use DNS, which can further move to HTTPS/SSL. There is not one solution to ‘do it all’, so our goal is to enable sharing as much Cyber Threat Intelligence with other security vendors in the proper context to create a Security EcoSystem. By…
-
DNS Security Takes Center Stage at RSA Conference 2019
SANS Institute exposed today’s top five new types of cybersecurity attack techniques, three of which are DNS-based, and how to counter them. Here’s what they had to say, and how Infoblox can help. RSA Conference 2019 has come to a close, and the world’s biggest cybersecurity event has left the thousands of attendees with…
-
Infoblox ActiveTrust Cloud, now called BloxOne Threat Defense, Wins Award for Hybrid Cloud Security
We are pleased to announce that Infoblox ActiveTrust Cloud, now called BloxOne Threat Defense, has won the Bronze medal for Hybrid Cloud Security category at the 2019 Cybersecurity Excellence Awards . The Cybersecurity Excellence Awards recognize companies, products, and individuals that demonstrate excellence, innovation,…
-
DNS DoT/DoH for Service Providers and Regulators
In a separate blog post, Cricket covered the last-mile security problem for DNS, solutions developed by the IETF, and our recommendations to enterprise administrators. You should read that post before reading this post…
-
Authoritative DNS Hijack Attacks
As the leading enterprise DNS vendor in the world, we get asked about DNS security often. If you have read some of our articles, you know we love a good technical solution to a problem, digging into protocol anomalies, reverse-engineering malware attack patterns, and the like. In this case, we were left with a bit of a…
-
DHS Issues Emergency Directive Following DNS Attacks
On January 22, 2019, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) released Emergency Directive 19-01, “Mitigate DNS Infrastructure Tampering,” in response to recent reports by FireEye and Cisco’s Talos Intelligence Group indicating that “dozens of domains belonging to government, telecommunications, and…
-
Architecting Scalable Security for NREN (National Research and Education Networks)
The Problem Internet connectivity facilitates the transfer of knowledge. Educational institutions therefore provide Internet access to scholars of all ages through National Research and Education Networks (NREN). Internet access not only provides access to a wealth of information and data but also exposes to risks. NREN…
-
Make DNS Your First Line of Defense Against Data Exfiltration
The Greatest Art Heist in American History Before we talk about how DNS can be exploited for data exfiltration, let’s talk about the greatest art heist in American history. In the early hours on March 18, 1990, while people were celebrating St. Patrick’s Day, two men disguised as police officers walked up to a side…
-
DDoS Attacks Make Their Big-Screen Debut -- What Enterprises can Learn from Ralph
If you have young children, or are a fan of Disney movies, you may have seen “Wreck It Ralph 2: Ralph Breaks the Internet,” and noticed that (spoiler alert!) a DDoS attack was the culprit. The film shows at a high-level the impact a DDoS attack can have on an end-user. But how can users – and enterprises – prevent these…