Case Study

Protecting Organizations in a World of DoH and DoT

Protecting Organizations in a World of DoH and DoT

Strata by Palo Alto Networks | Protecting Organizations in a World of DoH and DoT | Brief 1 Protecting Organizations in a World of DoH and DoT Organizations invest a lot of time, money, and effort in securing their networks. However, one area that often does not receive its due attention is the Domain Name System (DNS). DNS is commonly utilized in many attacks, from malware propagation to data exfiltration. According to Palo Alto Networks Unit 42 threat research, approximately 80% of malware uses DNS to establish a command-and-control (C2) channel. Since its inception, DNS has largely been unencrypted, but new encrypted DNS protocols that aim to improve privacy are gaining support among leading browser and other software vendors. With this increase in support, enterprise networks

Join for free to read