3 Reasons to Tune in to “The Threat Hunter’s Newest Weapon: DNS Data”

This Wednesday, Chris Day, Chief Cybersecurity Officer at Cyxtera will be joining us for an exclusive webinar, “The Threat Hunter’s Newest Weapon: DNS Data”.

Anna Ralph

December 11, 2017

This Wednesday, Chris Day, Chief Cybersecurity Officer at Cyxtera will be joining us for an exclusive webinar, “The Threat Hunter’s Newest Weapon: DNS Data”.

91% of malware attacks leverage DNS. So why aren’t more organizations using this gold mine of data to battle advanced persistent internal threats? With DNS data being be one of the most severely underutilized tools in battling bad actors, Chris Day will explain how system administrators, network engineers, and all threat hunters can use DNS data as a part of their cybersecurity arsenal. As 2017 comes to a close, Day will provide some great insight into what’s happened this past year, and what we can expect in 2018. If you’re still not convinced, here are just a few reasons why you should register.

1) You need to know what to look for

As a threat hunter, this question always arises: What should you be looking for in my DNS data? Due to the sheer volume of DNS queries that get logged, it can be difficult to tell what exactly this data can tell you about cyber attacks. One of the reasons DNS data is so underutilized is that many people don’t even know where to start. Wednesday’s webinar will take you through the hints to look for in your DNS data.

2) You need to know what to do right now

There are likely internal threats lurking on your network as you’re reading this. So, what can you do about it now? It’s important to know that while you may not be leveraging your DNS data, it’s all already there, ripe for analysis. There are steps you can take in the short-term to start preparing and protecting your network. Day will give us a few recent examples of how he used DNS to better understand cyberattacks.

3) You need to know what’s next

We are living in the age of inevitability, not prevention. Cyber threats are getting smarter and smarter and acting much faster than we seem to be able to react. That being said, it’s that much more important for threat hunters to shift their strategies and understand how to harness the power of DNS not only battling external threats but internal threats. Knowing what to look for in your data and what to anticipate can give you invaluable insight as far as forensics and detection.

All of this is just glimpse of what’s to come in Wednesday’s webinar. Make sure to tune in on December 13 at 2:00 PM EST to get the full picture, complete with a Q&A with Chris Day himself. Register here!


Published in:


An avatar of the author

Anna is a passionate content writer who’s always eager to learn something new about cyber security.

Related content

Get fast, resilient, and flexible DDI management with Integrity 9.6

With Integrity 9.6, network admins can get support for new DNS record types, architect and configure multi-primary DNS, and automate IP assignments.

Read more

Deepen your security insight with Infrastructure Assurance 8.3

BlueCat Infrastructure Assurance 8.3, with an enhanced analytics dashboard, including interactive widgets and top 10 alerts, is now available.

Read more

Security, automation, cloud integration keys to DDI solution success

Only 40% of enterprises believe they are fully successful with their DDI solution. Learn how to find greater success with new research from EMA and BlueCat.

Read more

Our commitment to Micetro customers and product investment

From CEO Stephen Devito, a word on BlueCat’s ongoing commitment to supporting Micetro customers and Micetro’s evolution as a network management tool.

Read more

Seven reasons to rethink firewall monitoring and boost automation 

With BlueCat Infrastructure Assurance, you can better protect your network with automated alerts and suggested remedies for hidden issues in your firewalls.

Read more

Five ways to avert issues with BlueCat Infrastructure Assurance

By flagging and notifying you of hidden issues before they cause damage, you can go from reactive to proactive in your Integrity DDI environment.

Read more