The most recent content from our members.
“Remember, Remember, the Fifth of November.” So begins the infamous nursery rhyme associated with Great Britain’s Bonfire Night, or Guy Fawkes Day. The fifth of November has also become a holiday associated with hacktivist group Anonymous by using Fawkes’ mask as the iconic symbol of its movement. With that, there’s no…
Sniffing out a RAT, or remote access Trojan, can be challenging for even the most prepared cyber defender. Cyberattackers continue to evolve their products and tactics to infect corporate systems as cybersecurity companies like Infoblox become increasingly aware of their tactics. Here’s an overview of this type of malware,…
The National Institute of Standards and Technology (NIST) has created the standard known as NIST 800-171, which was created due in part to the FISMA bill signed into action as of December 2014. The standard is in place for a guide on the minimum requirements for federal information systems and as a voluntary guide for…
by MIchael Katz, Infoblox Professional Security Sales Specialist DNS sinkholing is a very effective strategy to control access to network resources. Infoblox builds DNS sinkholes, with Infoblox DNS Firewall or Response Poicy Zones (RPZ). According to Infoblox documentation, a DNS RPZ enables you to “ define RPZ rules to…
We are pleased to announce that Infoblox ActiveTrust Cloud, now called BloxOne Threat Defense, has won the Bronze medal for Hybrid Cloud Security category at the 2019 Cybersecurity Excellence Awards . The Cybersecurity Excellence Awards recognize companies, products, and individuals that demonstrate excellence, innovation,…
By Chris Richardson with Bob Rose In our blog, Modern IPAM as a Security Asset Part 1, we proposed the importance of triangulating data for context and quick response, reliable data and 100% visibility of network endpoints. We’d like to continue the thought by recalling the story of Sam Security and Nancy Network. Sam…
As a best practice, many security professionals consider SIEM as a storage for all possible logs which are collected from various endpoint, servers, network equipment and software. This allows for the ability to correlate different types of events and effectively identify security threats. However, it doesn’t magically…
By Chris Richardson with Bob Rose IT'S TIME TO TRIANGULATE Recently, the following question came up: “How do IPAM and core network services relate to my functional role in security?” To answer this question and tie these concepts together, a timeless “back-pocket,” easy-read security blog by Srinivas Hanabe discusses how…
For this year’s National Cybersecurity Awareness month, let's take a closer look at the defensive opportunities provided by the Domain Name System (DNS), as well as the critical role DNS plays in protecting organizations against phishing and other cyberattacks. DNS is considered part of the “Internet Dial-tone.” While…
On May 29th, the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) published two joint technical alerts (JTAs) disclosing and describing threat indicators associated with the Joanap remote access tool (RAT) and the Brambul Server Message Block (SMB) worm. The alert attributes use of these…
It looks like you're new here. Sign in or register to get started.