Check out the latest Infoblox company news and updates.
Today’s networks have evolved from static, centralized environments to a highly distributed infrastructure spanning multi-cloud, on-premises, edge, and IoT/OT environments. With this increasing complexity, the ability to provide comprehensive protection has become an enormous challenge trying to stay ahead of the pace and…
In an era where aligning technology with business goals is paramount, learn why modernizing critical network services can save IT teams time while delivering unparalleled uptime and availability. Join this webinar featuring results from the 2023 commissioned Forrester Consulting Total Economic Impact™ DDI Study to learn…
Join us as we look at the powerful, proactive security value of takedown services. In addition to adding a highly proactive security layer, they may be your only option for addressing threats targeting your customers by impersonating your brand and destroying customer trust. Takedown veterans Gary Brewer and Chris Sills…
The world of cybersecurity laws is growing bigger and more complex by the day. The complexity is further amplified when considering that no individual product on the market can fully satisfy all the legal requirements. As a security professional, it's crucial to understand these cybersecurity regulations and developments…
The broad adoption of multiple cloud providers has given rise to a “hybrid multi-cloud infrastructure for many organizations, which has increased security, compliance, and network management complexity. Doug Cahill, Enterprise Strategy Group (ESG) Senior VP and Analyst, reviews ESG’s exclusive research findings on…
Since the inception of DNS, cyber-attacks that leverage the protocol have mushroomed. More than 90% of malware uses DNS in some form. The ubiquity of DNS, coupled with its historic lack of security controls have made it a prevalent attack vector today. Knowledge of DNS is crucial for security teams. Understanding its…
In April 2023, Infoblox disclosed the discovery of Decoy Dog, a malware toolkit that uses the domain name system (DNS) to perform command and control (C2). Decoy Dog had operated for over a year before detection. Since then we continued our research to understand the nature and severity of this threat. Join this Infoblox…
In today's ever-changing threat landscape, businesses need to adapt their security strategies to effectively protect their networks and sensitive data. The increasing trends of hybrid work, cloud adoption, IoT deployments, and mainstream AI have made networks more critical than ever before. DNS Detection and Response…
Today’s commercial, enterprise and government organizations require round-the-clock network availability and performance. But disruptive events are a constant threat to business continuity. It’s not so much if your network will go down but when. Fortunately, Infoblox offers solutions for ensuring continuous application…
It looks like you're new here. Sign in or register to get started.