Zero Trust Security

The most trusted security is to untrust

The traditional view that the security of our network is guaranteed by firewalls on the perimeter alone, and that everything inside is trustworthy and safe, is simply outdated. Adequate perimeter protection is no longer sufficient against advanced…

Misuse of DNS – and how to prevent it

The DNS infrastructure is fundamental to Internet communications, so it is not surprising that it is abused in so many different ways by so many different activities that threaten IT security. Let's look at some examples and possible solutions.…

What are we talking about when we are talking about DDoS protection?

Those who have survived a few DDoS attacks will probably know the answer, but for the rest of us, it's worth asking: should we be wary of such incidents? Our view is that it is best to be aware of the nature of DDoS attacks and to be prepared…