Several experts, companies, and national entities have voiced very convincing concerns about DoH and its features
"The DNS-over-HTTPS (DoH) protocol is not the privacy panacea that many have been advocating in recent months,"
warns Catalin Cimpanu
"If we are to listen to networking and cybersecurity experts, the protocol is somewhat useless and causes more problems than it fixes, and criticism has been mounting against DoH and those promoting it as a viable privacy-preserving method..."
When formulating a focused network security plan, you'll need to address specific questions about outbound traffic, user logins and government regulations
"With network security, we might think more is better. A common network security plan, for instance, might entail "all we can get", writes
"For starters, though, going overboard on network security is economically impractical. Each layer of security adds Capex and Opex costs. Furthermore, most network security services involve scanning network traffic in real time. As a result, the added latency of each security layer can degrade UX..."
In the arms race of computer security, it's never been more important to develop an adversarial mindset that can identify assumptions and determine if and how they can be violated
"Computer security is a very unique field," notes
Dr. Giovanni Vigna
"Unlike other fields in which the challenge is to overcome the scale of a problem or the complexity of an algorithm, in computer security the challenge is the wit of another human being who is trying to carry out an attack in order to compromise and disrupt a computing infrastructure.
Because of its adversarial nature, computer security is in continuous evolution..."
See all Archived IT News - Security articles
See all articles from this issue