archives
Horror Stories from Microsoft DNS Users
What is your worst nightmare?
A break-in to your home while you’re asleep? Falling into a pit of snakes à la Indiana Jones?
Scaling the Business of Culture
When company growth calls for 100 new positions to be added to your ranks, attracting the right talent is likely your #1 priority.
Is your DNS being held hostage?
In the second of this three-part series on DNS as a naïve enabler in malicious cyber activity, we introduce persona No. 2, DNS as a hostage.
DNS as Facilitator – A Naïve Resolver for Malware
Hackers are resourceful. They know that helpful DNS will always work to naively return an IP address when queried. DNS exists to connect clients to backend…
Manageable DNS Migrations: Moving to Adaptive DNS
If you’re considering a DNS migration, you’ll want to know these guys, Chris Buxton and Reese Cline. Between them, these two DNS architects have 45…
Elevate Toronto 2017
There is a major festival going on in Toronto where thousands of people clutch their show passes and fill theatres to fawn over their idols.
Network Virtualization is Like a Driverless Car
How is Network Virtualization like a driverless car?
DNS and the Challenge of Advanced Persistent Threats
Most cyber attacks are the online equivalent of a smash-and-grab robbery.
Why Client Facing DNS Firewalls are Critical to Network Security
Ask any CISO what a perfect world looks like and you’ll no doubt hear, “Full network visibility to secure the enterprise with no possibility of…
DNS Data: The New Cybersecurity Hero
There is cruel irony in DNS. By their very nature, Domain Name Systems facilitate an internet-friendly naming environment making it simple and seamless for…
DNS Digital Transformation Reduces Dell Outages to Zero
Stephen Stack, the former Global Head of Networks at Dell, shares how their digital transformation process started with DNS and ended with zero downtime.