Webcast: DNS security best practices; securing DNS infrastructure

Webcast: DNS security best practices; securing DNS infrastructure

Date: Mar 13, 2012

The underpinning of enterprise networks, the Domain Name System (DNS), remains vital to the integrity of the Internet and transactions carried out and processed across networks. Since critical flaws were discovered in DNS three years ago, the state of DNS security has received much more scrutiny.

In this SearchSecurity.com webcast, expert Char Sample examines the Domain Name System (DNS) and three methods your enterprise can use for securing DNS. These DNS security best practices include proper DNS configurations, the use of DNS Security Extensions, or DNSSEC, and how to monitor traffic to and from your enterprise DNS infrastructure. You’ll also learn about the threats and vulnerabilities associated with DNS.

About the speaker:
Char Sample, CERT security solutions engineer, has close to 20 years of experience in Internet security, and she has been involved with integrating various security technologies in both the public and private sectors.  She is presently a doctoral candidate at Capitol College, where her dissertation topic deals with the use of soft markers in attack attribution.

More on Enterprise Vulnerability Management

  • canderson

    The gaping hole in your vulnerability management program

    VIDEO - Authenticated vulnerability scanning may be just what your organization needs to complete its vulnerability management program. In this video, expert Kevin Beaver offers pointers for performing an authenticated vulnerability scan.
  • canderson

    Meeting PCI DSS compliance requirements with a data management program

    VIDEO - In order to meet PCI DSS requirements and compliance, it is important to organize and sort the data coming in by devising a data management plan.
  • canderson

    Creating a normalized corporate compliance program

    VIDEO - It's essential for IT security managers to create a corporate compliance program to adhere to regulations while maintaining a productive workplace.
  • Breaches show information security fundamentals prove hard to learn

    News - News roundup: Heartbleed vulnerabilities, point-of-sale malware and phishing scams are nothing new, yet numerous companies continue to fall victim to them. Shouldn't the lesson be learned by now? Plus: HTTP Shaming, Dropbox improvements and more.

    ( Aug 22, 2014 )

  • Five steps for improving an authenticated vulnerability scan

    Tip - Running an authenticated vulnerability scan can help detect flaws in your system, yet many organizations don't invest in this methodology. Security expert Kevin Beaver discusses five ways to get the most out of an authenticated vulnerability scan.
  • Debunking the myths of authenticated vulnerability scans

    Podcast - When it comes to authenticated vulnerability scans, there are many misunderstandings about the technology that leave organizations wary. Security expert Kevin Beaver explains what to expect from your scans.
  • Heartbleed security bug offers lessons in incident response

    Tip - Perhaps the biggest security bug of this generation, Heartbleed offers a number of lessons for improving incident response. Threat expert Nick Lewis highlights his key takeaways.
  • open redirect

    Definition - Open redirect is a security flaw in an app or a web page that causes it to fail to properly authenticate URLs.  When apps and web pages have requests for URLs, they are supposed to verify that those URLs are part of the intended page’s domain. Open redirect is a failure in that process that makes it possible for attackers to steer users to malicious third-party websites.

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: