[SANS ISC] New YouTube Video Series: Everything you ever wanted to know about DNS and more!, (Thu, May 20th)

You may have heard sayings like “If it is broken, it is probably a DNS problem. And if it isn’t DNS, it is still a DNS problem”. Or “Everything that happens on your network is reflected in DNS.”. DNS is a great protocol, sometimes shamed for things it can’t help itself with, and sometimes forgotten (if it works well). One of the amazing things I find about DNS is all its little nuances and how it all “fits together”. I planned this video series a couple months ago, and figured that this would be easy. I know DNS… but each time I look at DNS, I learn something new, so it has taken a while to get the first episodes together, and today I am releasing the first one. No fixed schedule on when they will be released (weekly?… if DNS doesn’t prevent me to post them). No fixed end… not done yet considering topics and ideas.

You can find the first episode here: https://www.youtube.com/watch?v=b8-f-vvygU4



Johannes B. Ullrich, Ph.D. , Dean of Research, SANS.edu

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

Source: Read More (SANS Internet Storm Center, InfoCON: green)

You might be interested in …

[ThreatPost] Crystal Valley Farm Coop Hit with Ransomware

All posts, ThreatPost

It’s the second agricultural business to be seized this week and portends a bitter harvest with yet another nasty jab at critical infrastructure. Source: Read More (Threatpost)

Read More

[ZDNet] Get paid to improve Linux and open-source security

All posts, ZDNet

The Linux Foundation and allies will pay developers to help secure Linux and open-source software programs. Source: Read More (Latest topics for ZDNet in Security)

Read More

[SecurityWeek] Apple Security Flaw: How do ‘Zero-Click’ Attacks Work?

All posts, Security Week

Apple has spent the past week rushing to develop a fix for a major security flaw which allows spyware to be downloaded on an iPhone or iPad without the owner even clicking a button. But how do such “zero-click” attacks work, and can they be stopped? read more Source: Read More (SecurityWeek RSS Feed)

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.