article thumbnail

GUEST ESSAY: Addressing DNS, domain names and Certificates to improve security postures

The Last Watchdog

In 2019, we’ve seen a surge in domain name service (DNS) hijacking attempts and have relayed warnings from the U.S. In the enterprise environment, domain names, DNS, and certificates are the lifeline to any internet-based application including websites, email, apps, virtual private networks (VPNs), voice over IP (VoIP) and more.

DNS 182
article thumbnail

A Reactive Cybersecurity Strategy Is No Strategy at All

CyberSecurity Insiders

A foundational approach to cybersecurity empowers CISOs to see abnormalities and block threats before they do damage. By increasing visibility into DNS traffic, CISOs can detect, block, and respond to incidents more quickly as well as use this data to institute new controls and increase overall resiliency.

DNS 140
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Five considerations for cloud migration, from the House of Representatives CISO

SC Magazine

“It’s about how you can do your business mission” in a different environment, with its own requirements for protecting data, Vickers said during his talk at the RSA Show’s Cloud Security Alliance CISO Summit. Other standards to consider are the Center for Internet Security (CIS) Controls and FedRAMP. Technical review.

article thumbnail

Reflections on third-party validation of HYAS capabilties

Security Boulevard

I remember when a CISO from a health care client called me to understand whether we were aligned from a moral standpoint, both as individuals, and as companies. By utilizing unique and bespoke data, assembled and correlated in the right way, HYAS has actually created the most effective Protective DNS solution on the planet.

DNS 69
article thumbnail

Attack Surface Management for the Adoption of SaaS

CyberSecurity Insiders

Earlier this year, I had the opportunity to speak before a group of CISOs about the topic of attack surface management (ASM). DNS subdomain scanning is a useful tactic to discover internet-exposed SaaS application portals and their APIs. By Alfredo Hickman, head of information security, Obsidian Security.

article thumbnail

Quantum Computing: A Looming Threat to Organizations and Nation States

SecureWorld News

As for the panel presentation at SecureWorld Denver , it features Edgar Acosta, Experienced Cybersecurity Professional (former CISO at DCP Midstream ); Craig Hurter, Sr. Director of Information Security, State of Colorado Governor's Office of Information Technology; and Toby Zimmerer, Sr. Demand and Delivery Director, Optiv.

article thumbnail

Addressing Remote Desktop Attacks and Security

eSecurity Planet

Also read : Best Internet Security Suites & Software. On a Sunday in February 2018, the Colorado CISO’s office set up a temporary server to test a new cloud-based business process. Meanwhile, the suspect server was connected to the CDOT domain with an administrator account and the internet.

VPN 120