Webcast: DNS security best practices; securing DNS infrastructure

Webcast: DNS security best practices; securing DNS infrastructure

Webcast: DNS security best practices; securing DNS infrastructure

Date: Mar 13, 2012

The underpinning of enterprise networks, the Domain Name System (DNS), remains vital to the integrity of the Internet and transactions carried out and processed across networks. Since critical flaws were discovered in DNS three years ago, the state of DNS security has received much more scrutiny.

In this SearchSecurity.com webcast, expert Char Sample examines the Domain Name System (DNS) and three methods your enterprise can use for securing DNS. These DNS security best practices include proper DNS configurations, the use of DNS Security Extensions, or DNSSEC, and how to monitor traffic to and from your enterprise DNS infrastructure. You’ll also learn about the threats and vulnerabilities associated with DNS.

About the speaker:
Char Sample, CERT security solutions engineer, has close to 20 years of experience in Internet security, and she has been involved with integrating various security technologies in both the public and private sectors.  She is presently a doctoral candidate at Capitol College, where her dissertation topic deals with the use of soft markers in attack attribution.

More on Enterprise Vulnerability Management

  • canderson

    How to use BeEF, a free penetration testing framework

    VIDEO - Video: Keith Barker of CBT Nuggets shows how to use the BeEF Project, a free penetration testing framework, to train employees on Internet browser security.
  • canderson

    The gaping hole in your vulnerability management program

    VIDEO - Authenticated vulnerability scanning may be just what your organization needs to complete its vulnerability management program. In this video, expert Kevin Beaver offers pointers for performing an authenticated vulnerability scan.
  • canderson

    Meeting PCI DSS compliance requirements with a data management program

    VIDEO - In order to meet PCI DSS requirements and compliance, it is important to organize and sort the data coming in by devising a data management plan.
  • social engineering penetration testing

    Definition - Social engineering pen testing is designed to test employees' adherence to the security policies and practices defined by management. The purpose is to ascertain the company's vulnerability to social engineering exploits.
  • network attack surface

    Definition - Every point of network interaction is a part of the network attack surface. Hackers, industrial spies and malware such as worms and advanced persistent threats (APTs) target these points for potential entry to a network they wish to disrupt or capture data from.
  • social engineering attack surface

    Definition - Social engineering attacks usually take advantage of human psychology: the desire for something free, the susceptibility to distraction, or the desire to be liked or to be helpful. The social engineering attack surface is the totality of an individual or a staff’s vulnerability to trickery.
  • Lessons learned: Network security implications of Shellshock

    Tip - Shellshock had a tremendous impact on network security, affecting many popular vendors and products. Expert Kevin Beaver discusses what Shellshock means to network security, and the lessons that can be learned from the vulnerability.
  • Sony Pictures hacking back: The ethics of obfuscation

    News - News roundup: Amid a devastating breach incident Sony Pictures is fighting back, raising legal and ethical questions. Plus: A big week in security acquisitions; Comcast sued over open Wi-Fi; and Yahoo announces vulnerability disclosure policy.

    ( Dec 12, 2014 )

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: