Cygna Labs
Book a Demo
shield

Strengthen your organization’s cybersecurity posture with software solutions from Cygna Labs

DNS Anycast Addressing

DNS Anycast Addressing

Anycast addressing offers tangible benefits for DNS high availability, fault tolerance, performance, and DDoS protections and Cygna DDI solutions streamline anycast implementation.

November 04, 2024

Timothy Rooney

DDI Enriches Cyberthreat Intelligence

DDI Enriches Cyberthreat Intelligence

DNS and IPAM forensics data is vital to clearer analysis of cyberthreat vulnerabilities and events.

August 12, 2024

Timothy Rooney

DDI Impacts Everything

DDI Impacts Everything

As foundational networking technology, DDI touches every aspect of your network from LAN/WAN to SDWAN/SASE to multi-cloud deployments.

July 16, 2024

Timothy Rooney

What matters in a DDI solution? (Part 2)

What matters in a DDI solution? (Part 2)

DDI information is vital to cyberthreat investigations and leading DDI solutions offer differing approaches. Review key DDI cybersecurity requirements you should consider.

May 02, 2024

Timothy Rooney

Don’t get caught in a Windows BIND

Don’t get caught in a Windows BIND

If you’re running ISC BIND DNS on a Microsoft Windows platform, be aware that the latest BIND version does not support windows and versions that do are approaching end-of-life. But there are alternatives!

December 01, 2023

Timothy Rooney

Plan to be more secure in ’24!

Plan to be more secure in ’24!

The domain name system serves as both a target and a vehicle for nefarious actors. Read how to protect your critical DNS infrastructure to better protect your organization.

October 30, 2023

Timothy Rooney

What Just happened?

What Just happened?

A layered security approach provides multiple opportunities to detect and mitigate a cybersecurity event. Enable multiple DDI layers within your defense in depth security strategy.

October 24, 2023

Timothy Rooney

You Can’t Secure What You Can’t See

You Can’t Secure What You Can’t See

DHCP and DNS transaction data can provide unique insights into the tactics of an attacker and turn the tide in a cyberthreat investigation.

September 01, 2023

Timothy Rooney

Detect APT Activity via DNS

Detect APT Activity via DNS

The DNS protocol can be abused by attackers to steal your sensitive data for exploitation. Protect your network and shutdown DNS tunnels with Cygna Radar.

June 19, 2023

Timothy Rooney

The NIST Cybersecurity Framework and DDI

The NIST Cybersecurity Framework and DDI

Apply the NIST Cybersecurity Framework to your DDI deployments to improve DDI and overall network security.

May 01, 2023

Timothy Rooney

A Domain by Any Other Name

A Domain by Any Other Name

Know the signs and possible ramifications of domain name distortion.

March 21, 2023

Timothy Rooney

Is DHCPSEC a Thing?

Is DHCPSEC a Thing?

Dynamic Host Configuration Protocol (DHCP) and the Domain Name System (DNS) are both foundational IP network services, enabling devices to connect to networks (via automated DHCP address and parameter assignment) and to navigate networks (via DNS name-to-IP resolution).

December 06, 2022

Timothy Rooney

SD-DDI for SD-WAN

SD-DDI for SD-WAN

Software defined WANs (SD-WANs) offer cloud-optimized network performance and agility. Your core network services of DHCP, DNS, and IPAM (DDI) must keep pace with a software-defined DDI (SD-DDI) solution.

October 03, 2022

Timothy Rooney

Open Your Eyes to Better Network Security

Open Your Eyes to Better Network Security

Visibility is step one to identifying and monitoring network and DDI assets and transactions.

June 21, 2022

Timothy Rooney

DDI as code

DDI as code

IP Address Management (IPAM) and its corollary functions DHCP and DNS, collectively DHCP-DNS-IPAM (DDI), is often considered a necessary evil by most IT and Operations Engineers.

April 25, 2022

Timothy Rooney

The Non-Zero Components of a Zero Trust Network

The Non-Zero Components of a Zero Trust Network

In the face of a rising tide of network infiltration attempts via increasingly diversified attack vectors, enterprises must constantly remain vigilant and proactive in managing system monitoring and attack detection solutions.

March 28, 2022

Timothy Rooney

categories