dns-rpz


VIEW POST

View more
BIND Domain Name Service Response Policy Zone

BIND Response Policy Zones

By
on
June 10, 2020

Domain Name Service

Accessing resources across the internet is done through the use of IP addresses. When trying to access your email, Google for searching, or your favorite social media outlet, you are making a connection to the their IP address. The Domain Name Service (DNS) converts a name to…

DNS


VIEW POST

View more
BIND Domain Name Service

DNS Architecture

By
on
April 10, 2020

Deploying a local BIND DNS server for an organization can be quite daunting. There are a multitude of options available within the configuration of the service. Though secure configurations are extremely important, one must not overlook how to architect its set up within a network. Architecting the service correctly…

Svart Hal


VIEW POST

View more
Domain Name Service Svart Hal

Svart Hal: The DNS Firewall

By
on
April 1, 2020

With the unprecedented circumstances we as a society are facing, we have begun to transition from on-premise to a remote workforce. Though this transition is exciting to some, it can truly bring undue stress to an organization, its workforce, and IT infrastructure. Organizations that are new to a remote…

Encryption


VIEW POST

View more
Domain Name Service Privacy

Continuous Battle Over Encryption And Your Privacy

By
on
October 13, 2019

Privacy vs. Services

The NCTA, CTIA, and US Telecom recently sent an open letter to congress with concerns over Google’s implementation of the DNS over HTTPS (DoH) protocol. The DoH protocol allows for encryption of DNS look ups providing additional privacy on the internet. In the letter the companies state…

dns


VIEW POST

View more
BIND Domain Name Service Privacy

BIND And DNS-Over-HTTPS

By
on
September 9, 2019

Privacy and security professionals have been pushing for encryption of internet traffic for many years now. Not only has there been a significant push from the privacy community, search engine giants like Google almost force websites to use encryption to increase search engine optimization (SEO) to drive higher results….

CCPA Logo


VIEW POST

View more
Privacy

The California Consumer Privacy Act And The .US Domain

By
on
May 25, 2019

As I start this off I would be remiss to state that yes, I have a .us domain, however so do many Americans. You see, the .us top level domain (TLD) is only available to those who reside within the United States. There are other requirements too such as…

Password Lock


VIEW POST

View more
NIST Security

Password Rotation And The Problem Of Not Doing It

By
on
May 14, 2019

Since the release of NIST SP 800-63-3 I have been asked, “Why does our company still perform password rotation?” This question is easier said than done. It is one that requires user awareness training, implementation of auditing and alerting software, and most importantly – multifactor authentication. All of which…

Facebook


VIEW POST

View more
Privacy Security Social Media

Facebook Exposes Millions of Passwords in Clear Text

By
on
March 26, 2019

Facebook has been under the spot light for quite some time now for its poor security and privacy practices. With this latest privacy blunder, its obvious that the company has not learned from its past. Last week it was uncovered that the company is storing passwords in clear text….

Internet of Things


VIEW POST

View more
Security

State Sponsored Probing Internet of Things Devices

By
on
February 4, 2019

In order to beef up security of consumer based Internet of Things devices, Japan will now scan IoT devices within its borders. Beginning mid-February, the National Institute of Information and Communications Technology will attempt to break into an estimated 200 million devices. The institute has compiled a list of…

Yubico Logo


VIEW POST

View more
Privacy Security

2019 State of Password and Security Behaviors

By
on
January 31, 2019

This year Yubico teamed up with the Ponemon Institute to deliver the 2019 State of Password and Authentication Security Behaviors report. The report was sampled from around 15,000 participants from around the globe which touched on topics which included privacy and security. The report depicts the grim reality of…

Recent Comments