IT Management  >   Systems Operations  >   Network Management  >  

Domain Management

RSS Feed   
Domain Management Reports
 
Types of DNS Attacks Reveal DNS Defense Tactics
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchSecurity.com details different types of common domain name system (DNS) attacks, the unusual behaviors they invoke, and which defense tactics work best in the given scenario. View now to learn more!
Posted: 21 Mar 2013 | Published: 21 Mar 2013

SearchSecurity.com

Core - DNS - The fastest, easiest way to secure your network
sponsored by Cisco Umbrella
WHITE PAPER: IT leaders are under constant pressure to provide adequate security in an increasingly dangerous world. It can be difficult to sift through the countless security options to find a good fit for your strategy. In this white paper, take a closer look at Cisco Umbrella to determine if it would be a good fit for your team.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

Cisco Umbrella

Everything Starts with DNS: Making the Internet a Safer Place
sponsored by Farsight Security
RESOURCE: During an investigation into potential cybercriminal activity, there's usually a domain or IP address that serves as your starting point. Find out how to use the world's largest real-time and historical DNS intelligence database to bring new levels of insight to your investigation.
Posted: 23 Aug 2018 | Published: 23 Aug 2018

Farsight Security

IPV6 Transition – Why the rush ?
sponsored by ComputerWeekly.com
ANALYST BRIEF: This report from Ovum warns that enterprises need to recognise that they will need to move to IPv6, even if they have IPv4 addresses available. They should treat IPv6 like any other disaster recovery plan.
Posted: 01 Dec 2011 | Published: 01 Dec 2011

ComputerWeekly.com

Passive DNS for Threat Intelligence
sponsored by Farsight Security
RESOURCE: This technology overview explores how real-time and historical passive DNS data allows security analysts to enrich and refine existing threat data to transform threat feeds into actionable, relevant threat intelligence.
Posted: 23 May 2018 | Published: 23 May 2018

Farsight Security

Global Internationalized Domain Name Homograph Report
sponsored by Farsight Security
RESEARCH CONTENT: Internationalized Domain Names (IDNs) are often abused by cybercriminals to conduct malicious activities, such as phishing or malware distribution. In this new research report, Farsight Security Global Internationalized Domain Name Homograph Report, examine the prevalence and distribution of IDN homographs across the Internet.
Posted: 18 Mar 2019 | Published: 18 Mar 2019

Farsight Security

DNS Monitoring and What it Means for the Enterprise
sponsored by AppNeta
WHITE PAPER: DNS is part of your network's backbone, and as a result, it's inherently tied to your network's performance, its security, and – ultimately – the user experience that it delivers. Find out how you can effectively monitor DNS performance across all of your locations so that you can identify and resolve issues before they negatively impact end users.
Posted: 08 May 2019 | Published: 08 May 2019

AppNeta

DNS Co-Founder Discusses the Need for a More Secure DNS
sponsored by Dyn
EGUIDE: This expert e-guide features a Q&A with Paul Mockapetris, inventor of the Domain Name System, where he discusses the immediate need for a more secure DNS and Internet. Additionally, learn what security risks IoT will bring to DNS.
Posted: 24 Oct 2016 | Published: 20 Oct 2016

Dyn

Top 5 DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 15 Aug 2013 | Published: 31 May 2013

Infoblox

Disaster Preparedness for Core Network Services
sponsored by Infoblox
WHITE PAPER: This white paper will take a look at how failures can unexpectedly disrupt core network services and the applications that depend on them despite employing traditional approaches to providing redundant configurations. Read this white paper to learn how to minimize the effects of failures to ensure business continuity.
Posted: 15 Aug 2013 | Published: 31 Jan 2013

Infoblox
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info