If you're maintaining your own domain name system (DNS), then increasingly you'll need to implement a secondary DNS solution to provide your business with the redundancy it requires to maintain its online presence.

Read our latest guide about using secondary DNS service to keep your infrastructure safe from cyber criminals.



This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

NOTICE: following the downloading of this report CSC may send you information about our services. Each communication will include a link to opt out of receiving such communications and you have the right to unsubscribe at any time.



DNS Hijacking: Security Learnings From the Latest Incidents

DNS Hijacking: Security Learnings from the Latest Incidents

Waves of DNS hijacking affecting government and telecommunications domains, as well as internet infrastructure entities across the globe, has resulted in increased efforts—even emergency directives—to protect domains from further attacks.

The U.S. Department of Homeland Security (DHS) has quickly implemented new procedures to further protect federal domains. And other governments—including the U.K. and France—are following suit.

In this recorded webinar, CSC global product director of Security Services, Mark Flegg, discusses recent events, learnings gained, the most relevant developments around digital asset security, and how it all impacts your company in the fight against cyber threats.

Cyber Security, dns management, ddos mitigation, two-factor (two factor) authentication, DNS hijacking, registry lock, registrar lock, two-factor authentication, 2FA


DNS Hijacking: Recent Events & Recommendations

DNS Hijacking: Recent Events and Recommendations

Businesses have invested in security solutions at an exponential rate to protect their organizations from cyber threats. Yet, many companies remain exposed to what security experts are now referring to as critically important security blind spots.