If you're maintaining your own domain name system (DNS), then increasingly you'll need to implement a secondary DNS solution to provide your business with the redundancy it requires to maintain its online presence.

Read our latest guide about using secondary DNS service to keep your infrastructure safe from cyber criminals.


Download this CSC Resource


Fields cannot be blank. Please complete all fields.
Fields may not contain unacceptable characters.
Email address must be in a valid format.
Email address must be a business email address.

Learn how to unsubscribe from emails.

CSC's marketing emails consist of information like eNewsletters, invitations to events, and other similar communications. You may unsubscribe from such service at any time and can contact CSC by mail at 251 Little Falls Drive, Wilmington DE, 19808-1674 Attn: Records Department or by phone at 1-866-403-5272.

NOTICE – following the downloading of this report CSC may send you information about our services. Each communication will include a link to opt out of receiving such communications and you have the right to unsubscribe at any time.



DNS Hijacking: Security Learnings From the Latest Incidents

DNS Hijacking: Security Learnings from the Latest Incidents

Waves of DNS hijacking affecting government and telecommunications domains, as well as internet infrastructure entities across the globe, has resulted in increased efforts—even emergency directives—to protect domains from further attacks.

The U.S. Department of Homeland Security (DHS) has quickly implemented new procedures to further protect federal domains. And other governments—including the U.K. and France—are following suit.

In this recorded webinar, CSC global product director of Security Services, Mark Flegg, discusses recent events, learnings gained, the most relevant developments around digital asset security, and how it all impacts your company in the fight against cyber threats.

Cyber Security, dns management, ddos mitigation, two-factor (two factor) authentication, DNS hijacking, registry lock, registrar lock, two-factor authentication, 2FA


DNS Hijacking: Recent Events & Recommendations

DNS Hijacking: Recent Events and Recommendations

Businesses have invested in security solutions at an exponential rate to protect their organizations from cyber threats. Yet, many companies remain exposed to what security experts are now referring to as critically important security blind spots.