×
  • Avoid the DNS outage that could cost you the C-suite

    By Steve Goodbarn Co-founder and Chairman, Secure64 Summary of article published in The Business Journals. To read the article in its entirety, click here:  A DNS outage will take your business offline – and potentially your job with it.  It is time to make DNS security a critical focus point…

    Read More
    0 2762
  • Dyn, BIND and DNS Strategy

    by SECURE64 on NOVEMBER 4, 2016 · · On October 21, 2016, leading websites including Twitter, Netflix and Spotify were severely interrupted by an attack on DNS hosting provider Dyn.  Many service providers experienced degradation in their DNS services because attempts to access popular web sites resulted in a SERVfail…

    Read More
    0 3519
  • Blocking Attacks from the Incredibly Insecure Internet of Things (IIIoT)

    by THERESA DEGROOTE on OCTOBER 26, 2016 In the wake of the massive attack against DNS provider Dyn, we as a security industry need to ask ourselves “what the hell are we going to do about the usage of dumb, secure-less IOT devices to become a bot army?” In the…

    Read More
    0 3163
  • DNS Hosting – the problem with centralization

    Recently, Robert Reich argued that the centralization of DNS on the “platforms of giants” has led to the vulnerability of the internet, as witnessed by the massive assault on DNS provider Dyn.  Last Friday’s attack led to problems accessing popular sites, including Twitter, Reddit, PayPal, and Netflix, and has left…

    Read More
    0 3511
  • Performing a signing algorithm rollover is not for the faint of heart

    We are proud of our DNSSEC heritage here at Secure64. We launched the first fully automated DNSSEC signing appliance in 2008, just weeks after security researcher Dan Kaminsky made public the flaws in the DNS protocol that DNSSEC addresses. Our goal from the very beginning was to make deploying DNSSEC…

    Read More
    0 3265
  • Blocking Bad Internet Content – do it at the DNS

    On June 9th, Ethiopia became the latest nation state to move to legislate on Internet content.  I, for one, am sold on the idea of blocking bad internet content, especially illegal content.  Give organisations, institutions and parents control over what internet content comes through their networks. It is empowering.  It…

    Read More
    0 1114
  • New Year, New BIND Security Vulnerabilities.

    We are barely into the new year, and BIND users have more patching to do. Today, the Internet Software Consortium (ISC) announced the availability of patches to fix two critical BIND security vulnerabilities: • CVE-2015-8704 • CVE-2015-8705 Both of these vulnerabilities

    Read More
    0 943
  • The Grinch Comes Early for BIND Users

    The grinch showed up early for BIND users this year, in the form of two new critical security vulnerabilities that can crash BIND. The two vulnerabilities are: • CVE-2015-8000 • CVE-2015-8461 ISC has released patches of its BIND software that correct the problem. Users of BIND-based appliances from vendors such…

    Read More
    0 842
  • When It Rains, It Pours. More BIND Vulnerabilities.

    September 2, 2015 was not a good day for BIND users. Two new critical security vulnerabilities were announced today – both of them are remotely exploitable vulnerabilities that crash the server. The two vulnerabilities are: CVE-2015-5986 CVE-2015-5722 ISC has release patches of its BIND software that correct the problem. Users of…

    Read More
    0 616
  • Secure64 DNS Products Not Vulnerable to BIND Security Flaw

    On July 28, 2015, the Internet Systems Consortium reported a critical security vulnerability in BIND, CVE-2015-5477. This vulnerability, which affects both BIND recursive and authoritative servers, is caused by an error in the handling of TKEY queries, allowing a remote attacker to crash BIND by sending a deliberately constructed query. This vulnerability is…

    Read More
    0 575
Translate »
Contact Us