New Insights into DNSSEC Adoption

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10
Previous Next

Click through for results from a Domain Name System Security Extensions (DNSSEC) survey conducted by IID, in coordination with Online Trust Alliance.

IID (Internet Identity), a provider of technology and services that help organizations secure their Internet presence, recently announced results from a survey of corporate IT security experts on the impact and future of domain name system security extensions (DNSSEC). The survey, conducted in coordination with the Online Trust Alliance, found that half of the respondents either hadn’t heard of DNSSEC or expressed limited familiarity with it. Those who do understand the technology believe key obstacles including lack of training/implementation services, slow ISP resolver rollout and limited client-aware applications will lead to a two to five-year adoption period.

DNSSEC is an emerging Internet security standard. It is designed to protect Internet users from getting misdirected to unintended Internet destinations by ensuring domain name system (DNS) entries remain unchanged in transit. The Internet’s root servers at the top of the DNS hierarchy added DNSSEC support last July. More than 25 top-level domains — including .gov, .org, .edu and .net — have enabled DNSSEC since then. On March 31, DNSSEC will be enabled on the .com top-level domain, which has more than 80 million registered names according to VeriSign, the operator of .com.

This slideshow highlights some of the findings of the IID survey.

More Slideshows:


Tech CEO Report Card Find out how the CEOs of 12 top tech companies are rated by their employees.

Ten Free Software Tools for the Cost-Conscious Consultant Free applications that will help you manage your time and tackle niche tasks.


Six Tips for a Greener Data Center Steps for creating better airflow in the data center.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Risk6-290x195 Top Barriers to Effective Vulnerability Risk Management

When it comes to the effectiveness of traditional vulnerability risk management programs, the challenges are often rooted in the process itself. ...  More >>

HexisCyberSoluRetailTargets0x Eight Reasons Why Cyber Attacks Hit Retailers

With limited IT resources and massive amounts of customer data to protect across multiple endpoints, effectively monitoring and defending the network from vulnerabilities is no easy task. ...  More >>

security14-190x128.jpg Financial Sector Sees Cyber Incident Increase in February

In February 2015, Financials was the lone industry sector with cybercrime incidents above six-month averages. This is largely attributed to the massive breach at health insurer Anthem. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date