Old Technology, New Tricks: Why DNS Is Still A Major Security Target

In the early days of networking, if you wanted to send a message from one machine to another, you manually entered the IP address. This quickly became unsustainable as the network grew and heaps of websites were created. Then, in 1983, network engineer Paul Mockapetris introduced the Domain Name System (DNS), which allowed the internet to grow into the massive global network it is today. It’s basically the foundation on which the internet works. 

DNS translates a domain name like www.example.com into four sets of numbers that comprise that domain’s IP address. It saves users the hassle of having to memorize seemingly random strings of numbers—the IP address—and it’s why DNS is often called “the phonebook of the internet.”

Read more at forbes.com

Search
  • There are no suggestions because the search field is empty.
Latest posts
Part 2: TK Keanini featured in ITPro Today Cybersecurity Trends and Predictions 2025 Part 2: TK Keanini featured in ITPro Today Cybersecurity Trends and Predictions 2025

By 2025, zero trust will be the dominant architecture model, fully replacing outdated perimeter-based models. Security controls will focus increasingly on the workforce and workloads rather than just the workplace, leading to enhanced protection across diverse environments.

DNSFilter’s Annual Security Report Reveals Worrisome Spike in Malicious DNS Requests DNSFilter’s Annual Security Report Reveals Worrisome Spike in Malicious DNS Requests

Data shows one in every 174 requests is malicious, up from one in every 1,000 in the previous report

Part 1: TK Keanini featured in ITPro Today Cybersecurity Trends and Predictions 2025 Part 1: TK Keanini featured in ITPro Today Cybersecurity Trends and Predictions 2025

By 2025, generative AI will be integrated into nearly every business and department, significantly boosting productivity. However, this will also introduce new security risks that organizations will need to address. Simply automating tasks won't be enough. A focus on secure automation and responsible AI practices will be essential. Additionally, creating cyber exploits will become easier, as the barrier to entry lowers. Individuals will need to t...

Explore More Content

Ready to brush up on something new? We've got even more for you to discover.