Hairpin NAT vs split-DNS

Hairpin NAT vs split-DNS

| | ADAMnetworks® Blog
From time to time this discussion comes up in support and in various forums over the years. I wanted to have a simple article for this to be easily understood. What problem ...
About Microsegmentation

About Microsegmentation

| | ADAMnetworks® Blog
First, a little history When I zoom out on our timeline, I can so clearly recall when the day came that we had the facility to connect computers to each other, operate ...

DNS Server Pinning at the Network Level

| | ADAMnetworks® Blog
What is DNS Server Pinning? Who needs yet another description of how to use DNS with best practices at a network level? Say no more, we’re adding to the dictionary, albeit not ...
Infrastructure Laundering - how DNS as the root of trust offers protection

Infrastructure Laundering – how DNS as the root of trust offers protection

| | ADAMnetworks® Blog
Brian Krebs published this very detailed article today: krebsonsecurity.com Infrastructure Laundering: Blending in with the Cloud – Krebs on Security In an effort to blend in and make their malicious traffic tougher ...
How to block Windows Update

How to block Windows Update

| | ADAMnetworks® Blog
Automatic Windows Update is simultaneously a blessing and a curse, depending on the environment, timing, production impact, etc. Wouldn’t it be nice to have another point of control as to when it ...
The Dirty Dozen of DNS Attacks

The Dirty Dozen of DNS Attacks

| | ADAMnetworks® Blog
Gone are the old days where the DNS protocol could be drawn out, in its simplest form, on a napkin. Over the years, the protocol has evolved tremendously that many of us ...
We protect people™. Why customer emotional footprint matters

We protect people™. Why customer emotional footprint matters

| | ADAMnetworks® Blog
We just got notification from the InfoTech business analysts that ADAMnetworks were included in the Software Reviews Emotional Footprint Awards 2024. Because we care about people - both the end user getting ...
Mastering DNS Resilience: How to Assess and Ensure Network Survivability

Mastering DNS Resilience: How to Assess and Ensure Network Survivability

| | ADAMnetworks® Blog
”It’s not DNS.” "There’s no way it’s DNS” ”It was DNS.” It’s as old as the internet. My age, basically. For most people, DNS is like electricity. We don’t celebrate its very ...
Remote Access Tools: The Hidden Threat Exploited by Malicious Actors

Remote Access Tools: The Hidden Threat Exploited by Malicious Actors

| | ADAMnetworks® Blog
Mitigating the trendy threat of cyber criminals LOTL (living off the land) If there’s one significant decade-long trend that happened and is here to stay, it is the ability to work remotely ...
How and why smishing and phishing sites aren't detectable with TrickyPhish

How and why smishing and phishing sites aren’t detectable with TrickyPhish

| | ADAMnetworks® Blog
Fighting desktop email client phishing attack surface is improving to the point where a lot of phishing sites need a single SafeBrowsing-equipped browser (Chrome, Safari, etc) submit meta-data to centralized threat intelligence ...