Domain Name Systems Research
-
Using digital twins to cut costs and improve safety at Shell
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at Shell's digital twin strategy, which combines AI, internet of things and big data to improve safety and cut costs. Our latest buyer's guide examines the best practices and technologies in business process automation. And we find out why securing DNS is critical to fighting cyber crime. Read the issue now.
-
Types of DNS Attacks Reveal DNS Defense Tactics
Sponsored by: TechTarget SecurityThis E-Guide from SearchSecurity.com details different types of common domain name system (DNS) attacks, the unusual behaviors they invoke, and which defense tactics work best in the given scenario. View now to learn more!
-
DNS Co-Founder Discusses the Need for a More Secure DNS
Sponsored by: DynThis expert e-guide features a Q&A with Paul Mockapetris, inventor of the Domain Name System, where he discusses the immediate need for a more secure DNS and Internet. Additionally, learn what security risks IoT will bring to DNS.
-
Using DNS Monitoring to Detect Network Breaches
Sponsored by: DynNumerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.
-
How DNS Information Can Help Cut Millions from Your Infrastructure Costs
Sponsored by: DynThis expert e-guide explains why DNS intelligence is the key to better network capacity planning and dynamic resourcing. Access now to begin planning to cut your infrastructure costs dramatically in the coming years.
-
Defending Against Application-Layer DDoS Attacks
Sponsored by: Juniper Networks, Inc.This white paper explains the serious problem that DDoS threats present, and how it impacts your business.
-
Protecting DNS Infrastructure—Inside and Out
Sponsored by: InfobloxThis white paper unveils the critical risk your domain name system (DNS) is in, and offers leading strategies to help you protect your infrastructure against outside-in and inside-out threats.
-
Creating a Best-of-Breed DDI Solution in a Microsoft Environment
Sponsored by: InfobloxAccess this informative whitepaper and learn how you can implement effective DNS, DHCP, and IP address management (DDI).
-
Master List of DNS Terminology
Sponsored by: DynIn this eBook, you'll find the most common DNS terms and their definitions to help you better understand DNS.
-
IBM X-Force 2013 Mid-Year Trend and Risk Report
Sponsored by: IBMIn this detailed white paper, explore this year's report on the latest risks and security challenges organizations are facing today, and offers best practices to boost security fundamentals and policies to meet these advanced persistent threats (APTs).
-
Ballarat Grammar Secures BYOD with HP Sentinel SDN
Sponsored by: Hewlett Packard EnterpriseIn this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.
-
Top Five DNS Security Attack Risks and How to Avoid Them
Sponsored by: InfobloxRead this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
-
Top 5 DNS Security Attack Risks and How to Avoid Them
Sponsored by: InfobloxThis paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
-
Disaster Preparedness for Core Network Services
Sponsored by: InfobloxThis white paper will take a look at how failures can unexpectedly disrupt core network services and the applications that depend on them despite employing traditional approaches to providing redundant configurations. Read this white paper to learn how to minimize the effects of failures to ensure business continuity.
-
How a DNS Firewall Helps in the Battle Against Advanced Persistent Threat and Similar Malware
Sponsored by: InfobloxUncover the role a DNS firewall can play in your security strategy for reducing loss of data due to stealthy advanced persistent threats (APTs) and other malware attacks.
-
DNS Firewalls and Defense Tactics
Sponsored by: InfobloxGain an in-depth look at today's most popular domain name system (DNS) attacks and the defense tactics against them. In addition, uncover how a DNS firewall can help keep your organization safe.
-
STATE OF DNS AVAILABILITY REPORT
Sponsored by: Verisign, Inc.View this informative white paper to learn more about the domain name system vulnerabilities that you should keep in mind for the busy season. Find out some of the challenges of availability and the impact downtime can have on your enterprise by accessing this resource.
-
Cisco Prime Network Registrar
Sponsored by: Cisco Systems, Inc.Learn about a solution that will help you simplify the management of IP addresses and ease your transition to IPv6.
-
Understanding Web Application Security Challenges
Sponsored by: IBMThis paper explains what you can do to help protect your organization, and it discusses an approach for improving your organization's Web application security.
-
Removing Internet Anonymity Barriers with IP Intelligence
Sponsored by: Digital ElementNetAcuity IP Intelligence technology provides an excellent way to non-invasively gather new intelligence about the online universe, and Digital Element delivers the de facto standard in IP Intelligence.
-
Managing DNS Services for Greater Network Security and Availability
Sponsored by: Neustar®Learn how to manage your DNS services for greater network security and availability.