3 Reasons to Tune in to “The Threat Hunter’s Newest Weapon: DNS Data”

This Wednesday, Chris Day, Chief Cybersecurity Officer at Cyxtera will be joining us for an exclusive webinar, “The Threat Hunter’s Newest Weapon: DNS…

This Wednesday, Chris Day, Chief Cybersecurity Officer at Cyxtera will be joining us for an exclusive webinar, “The Threat Hunter’s Newest Weapon: DNS Data”.

91% of malware attacks leverage DNS. So why aren’t more organizations using this gold mine of data to battle advanced persistent internal threats? With DNS data being be one of the most severely underutilized tools in battling bad actors, Chris Day will explain how system administrators, network engineers, and all threat hunters can use DNS data as a part of their cybersecurity arsenal. As 2017 comes to a close, Day will provide some great insight into what’s happened this past year, and what we can expect in 2018. If you’re still not convinced, here are just a few reasons why you should register.

1) You need to know what to look for

As a threat hunter, this question always arises: What should you be looking for in my DNS data? Due to the sheer volume of DNS queries that get logged, it can be difficult to tell what exactly this data can tell you about cyber attacks. One of the reasons DNS data is so underutilized is that many people don’t even know where to start. Wednesday’s webinar will take you through the hints to look for in your DNS data.

2) You need to know what to do right now

There are likely internal threats lurking on your network as you’re reading this. So, what can you do about it now? It’s important to know that while you may not be leveraging your DNS data, it’s all already there, ripe for analysis. There are steps you can take in the short-term to start preparing and protecting your network. Day will give us a few recent examples of how he used DNS to better understand cyberattacks.

3) You need to know what’s next

We are living in the age of inevitability, not prevention. Cyber threats are getting smarter and smarter and acting much faster than we seem to be able to react. That being said, it’s that much more important for threat hunters to shift their strategies and understand how to harness the power of DNS not only battling external threats but internal threats. Knowing what to look for in your data and what to anticipate can give you invaluable insight as far as forensics and detection.

All of this is just glimpse of what’s to come in Wednesday’s webinar. Make sure to tune in on December 13 at 2:00 PM EST to get the full picture, complete with a Q&A with Chris Day himself. Register here!

Critical conversations on critical infrastructure

Find out how your peers are managing their networks through profound change. Watch this series of live interactive discussions with IT pros & join the debate in Slack.

Join the conversation

Read more

To better see the threats on your network, try DNS

DNS is a vector used in most cyber attacks. When it comes to DNS, BlueCat can enhance visibility, detection, and containment of threats to your network.

Read more
Webinar: Threat Protection

BlueCat Solution Architect Steffen Probst discusses how intelligent security from BlueCat uses DNS to protect internal and external traffic against threats.

Read more
WFH, DOH & DNS: Keeping networks secure during unprecedented change

As we work from home, DOH (DNS over HTTPS) use is up by 1,500%. Learn what DNS tells us about network security and how BlueCat and Cisco Umbrella can help.

Read more
Domain Generation Algorithms 101

Dissecting the malware technique that keeps threat hunters guessing. For cybersecurity professionals and threat hunters, it can feel like advanced…

Read more

Subscribe to our blog