DNS Evolution: From Online Phone Directory to Traffic Controller

Where is your data stored? Where is the software located? You used to be able to answer these questions by pointing to the cabinet where your server was located.

Unauthenticated remote code execution vulnerability identified

The Trellix Threat Labs Vulnerability Research team has published research on an unauthenticated remote code execution vulnerability, CVE-2022-32548, that affects multiple routers manufactured by DrayTek, a Taiwanese company that manufactures Small Office and Home Office (SOHO) routers.

Attackers cost 42% of organisations over $1 million in breach damages

Providing further insight, Anthony James, VP of Product Marketing at Infoblox comments, “The pandemic shutdowns over the past two years have reshaped how companies around the world operate.

Why securing today’s hybrid workplace needs an ecosystem approach

While there may not be much that can be done about siloed reporting structures of security and networking teams (although there are indications that this is changing), integrating security tools and networking tools provide a pathway to sharing data that can be critical to speeding up investigations and response times.

Steps to safeguard against ransomware attacks

Ransomware assaults are becoming more common, resulting in millions of dollars in reputational harm, recovery costs, extorted ransom payments, revenue loss, and the inability to operate vital infrastructure, among other things