ADAMnetworks® Blog – ADAMnetworks
Topics in the ‘The ADAM Blog’ category Articles from our team about protecting the people and systems you care about.
Endpoint adoption of Encrypted DNS
Why endpoint secure DNS adoption matters In a world where we have security options (this is 2025, after all), and yet we don’t bother accessing them, it’s like having vegetables and protein ...

DNS Rebind Protection Revisited
After this week’s attention to META and Yandex localhost abuses, it is time to revisit a core feature/option of protective DNS that offers a feel-good moment to those that applied this safety ...

Unmasking ECH: Why DNS-at-the-Root-of-Trust Holds the Key to Secure Connectivity
Encrypted Client Hello (ECH) has been in the news a lot lately. For some background and relevant and recent content, see: IETF Proposed Standard Cloudflare Blog from 2023 announcing ECH support RSA ...

Introducing Wyo Support – ADAMnetworks LTP
ADAMnetworks is excited to announce Wyo Support to the family of Licensed Technology Partners. “After working with the various systems and technologies, there are few that compare with the protection that ADAMnetworks ...

ADAMnetworks Licensed Technology Partner (LTP) Program
ADAMnetworks Licensed Technology Partner (LTP) Program Empowering MSPs, MSSPs & MDR Providers with Next-Gen Zero Trust Security In today’s threat-filled digital landscape, reactive cybersecurity isn’t enough. Businesses, governments, and IT teams need ...

Hairpin NAT vs split-DNS
From time to time this discussion comes up in support and in various forums over the years. I wanted to have a simple article for this to be easily understood. What problem ...

About Microsegmentation
First, a little history When I zoom out on our timeline, I can so clearly recall when the day came that we had the facility to connect computers to each other, operate ...
DNS Server Pinning at the Network Level
What is DNS Server Pinning? Who needs yet another description of how to use DNS with best practices at a network level? Say no more, we’re adding to the dictionary, albeit not ...

Infrastructure Laundering – how DNS as the root of trust offers protection
Brian Krebs published this very detailed article today: krebsonsecurity.com Infrastructure Laundering: Blending in with the Cloud – Krebs on Security In an effort to blend in and make their malicious traffic tougher ...

How to block Windows Update
Automatic Windows Update is simultaneously a blessing and a curse, depending on the environment, timing, production impact, etc. Wouldn’t it be nice to have another point of control as to when it ...