IT News - Security

Several experts, companies, and national entities have voiced very convincing concerns about DoH and its features

"The DNS-over-HTTPS (DoH) protocol is not the privacy panacea that many have been advocating in recent months," warns Catalin Cimpanu in ZDNet.

"If we are to listen to networking and cybersecurity experts, the protocol is somewhat useless and causes more problems than it fixes, and criticism has been mounting against DoH and those promoting it as a viable privacy-preserving method..."

How To Develop And Implement A Network Security Plan
SearchNetworking, October 10th, 2019
When formulating a focused network security plan, you'll need to address specific questions about outbound traffic, user logins and government regulations

"With network security, we might think more is better. A common network security plan, for instance, might entail "all we can get", writes Kevin Tolly in SearchNetworking.

"For starters, though, going overboard on network security is economically impractical. Each layer of security adds Capex and Opex costs. Furthermore, most network security services involve scanning network traffic in real time. As a result, the added latency of each security layer can degrade UX..."

How To Think Like A Hacker
Dark Reading, October 9th, 2019
In the arms race of computer security, it's never been more important to develop an adversarial mindset that can identify assumptions and determine if and how they can be violated

"Computer security is a very unique field," notes Dr. Giovanni Vigna in Dark Reading.

"Unlike other fields in which the challenge is to overcome the scale of a problem or the complexity of an algorithm, in computer security the challenge is the wit of another human being who is trying to carry out an attack in order to compromise and disrupt a computing infrastructure.

Because of its adversarial nature, computer security is in continuous evolution..."

See all Archived IT News - Security articles See all articles from this issue