DDI for IIoT (Part 1)
The Industrial Internet of Things (IIoT) comprises a class of IoT specifically related to manufacturers, utilities, and public safety organizations in particular and require special DDI considerations.
February 12, 2024
How do you improve cybersecurity for your identity infrastructure (Part 1)?
Active Directory (AD) entitlements play a pivotal role in safeguarding your organization, serving as the primary means for authentication and authorization. This blog post emphasizes the criticality of minimizing the attack surface by implementing delegated AD security, adhering to the principle of least privilege. Learn how to validate user access, identify high-risk permissions, and address the challenges of managing and hardening entitlements.
February 06, 2024
2023 Cybersecurity – Year in Review
2023 has proven to be another chaotic year for cybersecurity with a resurgence in ransomware and extortion. Geopolitical conflicts have also resulted in an increase in attacks by state-based actors and sympathetic groups. Governing bodies are enacting new regulations and laws around cybersecurity.
December 15, 2023
Don’t get caught in a Windows BIND
If you’re running ISC BIND DNS on a Microsoft Windows platform, be aware that the latest BIND version does not support windows and versions that do are approaching end-of-life. But there are alternatives!
December 01, 2023
Keep Your Secrets Secret
Explore the growing threat of compromised secrets in cybersecurity breaches and the important role that secrets management plays in securing digital assets. Learn how Cygna Auditor can provide real-time alerts when unauthorized secrets are created outside the designated system. Be vigilant to minimize secrets security risks.
November 15, 2023
Plan to be more secure in ’24!
The domain name system serves as both a target and a vehicle for nefarious actors. Read how to protect your critical DNS infrastructure to better protect your organization.
October 30, 2023
What Just happened?
A layered security approach provides multiple opportunities to detect and mitigate a cybersecurity event. Enable multiple DDI layers within your defense in depth security strategy.
October 24, 2023
Cygna Security and Compliance Database Maintenance
Database maintenance is key to help ensure the reliability and performance of your Cygna Security and Compliance solutions. This post covers the steps to implement the suggested minimum maintenance for Cygna installations.
October 17, 2023
Our Contrarian DDI Strategy
Here’s why it makes perfect sense to retain and evolve two powerful DDI solutions within the Cygna Labs portfolio
October 03, 2023
You Can’t Secure What You Can’t See
DHCP and DNS transaction data can provide unique insights into the tactics of an attacker and turn the tide in a cyberthreat investigation.
September 01, 2023
Identity Security Part 2 – Active Directory Hardening and Identity Hygiene
Enhance your identity security with Active Directory hardening and identity hygiene! Discover how Cygna Labs Entitlement and Security for Active Directory can help you to safeguard your organization's identities.
August 22, 2023
Offering a Helping Hand Through Automation and Services
As enterprise networks have swelled from legacy LAN/WAN to private/public cloud, SDWAN, IoT, BYOD, SASE, and beyond, managing this increasing complexity has grown more challenging. DDI serves as a foundational management component of your diverse application and networking environment, and we can help ease your management complexity through automation and managed services.
August 01, 2023
Securing Teams and M365 with Cygna Auditor – Signs of an attack in progress
In Part 1, we talked about using logon locations to detect a potential breach. However, attackers can use a VPN to attempt to thwart those detections.
July 06, 2023
Securing Teams and M365 with Cygna Auditor – Looking at Login data
The most important part of remediating a breach is realizing that you have one in the first place.
July 06, 2023
Streamline Your Windows Event Log Analysis with Cygna Log Consolidator
Cygna Log Consolidator provides a solution to the challenges of event log analysis.
June 22, 2023
Detect APT Activity via DNS
The DNS protocol can be abused by attackers to steal your sensitive data for exploitation. Protect your network and shutdown DNS tunnels with Cygna Radar.
June 19, 2023
The NIST Cybersecurity Framework and DDI
Apply the NIST Cybersecurity Framework to your DDI deployments to improve DDI and overall network security.
May 01, 2023
A Domain by Any Other Name
Know the signs and possible ramifications of domain name distortion.
March 21, 2023
Applying ITIL4 Discipline to DDI
IP addresses and associated DHCP and DNS functions are foundational to IT services and applications running over an IP network; these functions must be prudently managed, just as other critical network infrastructure elements are managed via the centralization of control, monitoring, and provisioning of distributed network elements.
January 27, 2023
The Innumerable DDI Business Benefits
DNS-DHCP-IPAM (DDI) services are foundational to your network, which is foundational to your business in offering time and money saving features in the form of automation, improved security, high availability, and centrally managing your increasingly diverse network.
January 04, 2023
Are You Dreading Audit Reporting Time?
Do you spend a lot of time creating, running, and distributing audit reports? See how you can simplify the whole process by empowering users with Cygna.
December 20, 2022
Is DHCPSEC a Thing?
Dynamic Host Configuration Protocol (DHCP) and the Domain Name System (DNS) are both foundational IP network services, enabling devices to connect to networks (via automated DHCP address and parameter assignment) and to navigate networks (via DNS name-to-IP resolution).
December 06, 2022
How do you know who has access to what in Active Directory?
Active Directory (AD) is the primary method to provide authentication and authorization at 90% of the Global Fortune 1000 companies and the vast majority of organizations of all sizes. AD security issues can result in costly service disruptions and potentially data breaches or even non-compliance.
December 01, 2022