Dyn Blog

Read posts from Dyn's Internet Performance thought leaders as well as friends of Dyn on topics ranging from Managed DNS and Monitoring to Email Deliverability and Analytics.

  • Oracle Wins Round in Legal Battle With Rimini Street

    Oracle Wins Round in Legal Battle With Rimini Street

    A U.S. District court judge last week issued a permanent injunction in favor of Oracle against Rimini Street in a long running legal battle. The new order prohibits Rimini Street from using what...

    Read Now
  • What is Reasonable Security for Web Applications?

    What is Reasonable Security for Web Applications?

    Reasonable security is a concept prevalent in many data protection regulations, but its requirements are far from concrete. In the context of security for web applications and the evolving threat...

    Read Now
  • Five Web Application Security Best Practices

    Five Web Application Security Best Practices

    The internet is central to today’s businesses. Websites and applications are where companies and customers interact, often sharing sensitive data.  Unfortunately, that makes them prime targets for...

    Read Now
  • ×

    Want the best of the hub delivered to your inbox?

    Sign up for our newsletter!

    !
    Thanks for subscribing!
    Error - something went wrong!
  • The Secrets to Defeating Malicious Bots

    The Secrets to Defeating Malicious Bots

    Malicious bots are an increasingly dangerous threat to companies of all sizes, but many businesses don’t even realize they have a serious bot problem. Bots are deployed to carry out DDoS attacks,...

    Read Now
  • Civil War in Yemen Begins to Divide Country’s Internet

    Civil War in Yemen Begins to Divide Country’s Internet

    The latest development in Yemen’s long-running civil war is playing out in the global routing table.  The country’s Internet is now being partitioned along the conflict’s battle lines with the...

    Read Now
  • Why Web Application Security is Important

    Why Web Application Security is Important

    Websites and apps are increasingly under attack, so effective web application security must be a top priority. Before 2008, data breaches were somewhat rare, and most occurred because of human...

    Read Now
  • Last Month in Internet Intelligence: July 2018

    Last Month in Internet Intelligence: July 2018

    In June, we launched the Internet Intelligence microsite, including the new Internet Intelligence Map. In July, we published the inaugural “Last Month in Internet Intelligence” overview, covering...

    Read Now
  • BGP/DNS Hijacks Target Payment Systems

    BGP/DNS Hijacks Target Payment Systems

    In April 2018, we detailed a brazen BGP hijack of Amazon’s authoritative DNS service in order to redirect users of a crypto currency wallet service to a fraudulent website ready to steal their...

    Read Now
  • What’s the Worst Code You’ve Ever Written?

    What’s the Worst Code You’ve Ever Written?

    The mantra “everything as code” permeates today’s IT departments. Scripting is nothing new, but it’s experiencing a renaissance as the DevOps movement continues to grow.  Code enables IT pros to...

    Read Now
  • Machine Learning Security is Ready for Takeoff

    Machine Learning Security is Ready for Takeoff

    Today, hackers are winning the game, and the long list of successful breaches is their scorecard. Traditional endpoint security can’t keep up. Outdated perimeter defenses are being rendered...

    Read Now
  • Data Protection Regulations Emerge as Breaches Persist

    Data Protection Regulations Emerge as Breaches Persist

    The United States does not have a federal law on the books similar to the European Union’s General Data Protection Regulation, so it’s up to individual states to pass legislation.  On June 28,...

    Read Now
  • Web-Based Attacks Threaten Apps and Data

    Web-Based Attacks Threaten Apps and Data

    The wide variety of cyberattacks against websites, applications, and APIs exposed to the internet make security more complex than ever. Web-based attacks can affect the availability of sites and...

    Read Now
  • Iraq Protests Lead To Two-Day Blackout

    Iraq Protests Lead To Two-Day Blackout

    After a week of widespread protests against corruption and poor government services, the Iraqi government declared a state of emergency last week.  And as part of that measure, the government...

    Read Now
  • Making a Call for Better Telco Security

    Making a Call for Better Telco Security

    As phone and internet access have merged into one service, forming the pillar of just about every enterprise, telco security has come under attack. The telecommunications industry is rapidly...

    Read Now
  • Five Web Security Risks You Can Manage in the Cloud

    Five Web Security Risks You Can Manage in the Cloud

    Websites, applications, backend databases, and origin servers make up an organization’s web presence. An organization’s web presence is not always located behind the corporate firewall, so it is...

    Read Now
  • Last Month In Internet Intelligence: June 2018

    Last Month In Internet Intelligence: June 2018

    In June, we launched the Internet Intelligence microsite (home of this blog), featuring the new Internet Intelligence Map.  As the associated blog post noted, “This free site will help to...

    Read Now
  • Shutting down the BGP Hijack Factory

    Shutting down the BGP Hijack Factory

    It started with a lengthy email to the NANOG mailing list on 25 June 2018: independent security researcher Ronald Guilmette detailed the suspicious routing activities of a company called Bitcanal,...

    Read Now
  • Bot Protection Must Scale to Meet Today’s Threats

    Bot Protection Must Scale to Meet Today’s Threats

    Bots are ubiquitous, so bot protection should be too. More than half of today’s internet traffic is not derived from human activity. It comes from bots. Many bots are harmless, but others...

    Read Now
  • Got Malicious Bots? There are Solutions

    Got Malicious Bots? There are Solutions

    Malicious bots are not a new problem. They have just taken different forms over the years. Most organizations and consumers don’t realize that more than 60% of the traffic on the internet is not...

    Read Now
  • Three Takeaways from O’Reilly Velocity

    Three Takeaways from O’Reilly Velocity

    Oracle Dyn had a busy week at the O’Reilly Velocity Conference. Highlights of our time at the show in San Jose, Calif. included the launch of the Oracle Internet Intelligence Map, the opportunity...

    Read Now
  • loading
    Loading More...