These days, BYOD is the norm. Mobile devices from inside and outside
your network are continuously crossing mixed physical and cloud
infrastructure whose security may not always be under your control. As a
result, your network is being constantly exposed to malware threats.
And DNS is their main pathway. More than 90 percent of malware uses DNS
to communicate with command and control servers, steal data, or redirect
traffic to malicious sites. Existing security controls and perimeter
defenses are not designed to prevent, isolate, and remediate DNS-based
malware threats.
This is the news and personal publishing site of Ronald Bartels that wanders on and off the subject of Information Technology. Mostly now the topics are about IoT and SD-WAN.
Comments
Post a Comment