-
Guy Fawkes Day: The State of Cybersecurity in the United Kingdom
“Remember, Remember, the Fifth of November.” So begins the infamous nursery rhyme associated with Great Britain’s Bonfire Night, or Guy Fawkes Day. The fifth of November has also become a holiday associated with hacktivist group Anonymous by using Fawkes’ mask as the iconic symbol of its movement. With that, there’s no…
-
How to Catch a RAT by the Tail
Sniffing out a RAT, or remote access Trojan, can be challenging for even the most prepared cyber defender. Cyberattackers continue to evolve their products and tactics to infect corporate systems as cybersecurity companies like Infoblox become increasingly aware of their tactics. Here’s an overview of this type of malware,…
-
Cities Under Attack!
by Sunil Amanna, Infoblox Product Marketing Manager Threat actors are targeting municipalities with ransomware and many don’t know that it’s a huge risk. As described by the US Department of Homeland Security, ransomware is a type of malicious software, or malware, designed to deny access to a computer system or data until…
-
Detecting DGAs is like Forecasting Weather
By Philip Qian, Infoblox Senior Product Manager DGAs (Domain Generation Algorithms) are rendezvous domains for malware and hacker-controlled-servers to communicate, generated by rules or algorithms, usually encoded/encrypted and often have a short life span. Hackers use DGAs to evade the detection or blocking from static…
-
DNS Sinkholing at Scale with Infoblox
by MIchael Katz, Infoblox Professional Security Sales Specialist DNS sinkholing is a very effective strategy to control access to network resources. Infoblox builds DNS sinkholes, with Infoblox DNS Firewall or Response Poicy Zones (RPZ). According to Infoblox documentation, a DNS RPZ enables you to “ define RPZ rules to…
-
Let's Talk About Threats, Baby! Introducing ThreatTalk Cybersecurity Podcast
Let’s talk about threats, baby, let’s talk about you and me, let’s talk about all the good things and the bad threats that may be, let’s talk about threats! Let’s talk about threats! (to the tune of the legendary Salt N’ Peppa song, of course.) Over the past few years, podcasts have grown from a fringe media to one of the…
-
Infoblox ActiveTrust Cloud, now called BloxOne Threat Defense, Wins Award for Hybrid Cloud Security
We are pleased to announce that Infoblox ActiveTrust Cloud, now called BloxOne Threat Defense, has won the Bronze medal for Hybrid Cloud Security category at the 2019 Cybersecurity Excellence Awards . The Cybersecurity Excellence Awards recognize companies, products, and individuals that demonstrate excellence, innovation,…
-
Empowering you SIEM with Cyber Threat Intelligence
As a best practice, many security professionals consider SIEM as a storage for all possible logs which are collected from various endpoint, servers, network equipment and software. This allows for the ability to correlate different types of events and effectively identify security threats. However, it doesn’t magically…
-
Why SOC and NOC teams can benefit by working closely together
Network Operations Center (NOC) and Security Operations Center (SOC) are two critical pillars of any organization. Both teams continuously monitor logs and events from different tools to ensure that the network stays up and running and remains protected against cybersecurity attacks. The NOC team resolves incidents that…
-
National Cybersecurity Awareness Month - Security Challenges of DevOps
In honor of Cybersecurity Awareness Month, we are delving into the top security topics that enterprises should pay extra attention to as we head in to 2019. In my previous post, I briefly discussed the need to focus on data security, especially in our era of cloud adoption, and the security implications of the Internet of…