#ITWebSS2022: Securing against DNS threats

Read time 3min 30sec
Hakun Uzun
Hakun Uzun

Domain name system or DNS security threats are among the most common types of cyber threats that occur today, and therefore securing DNS should be an integral part of an organisation's security plan.

ITWeb Security Summit 2022: 31 May - 2 June

Book your seat now to get up to speed on cyber security trends, solutions and best practices. The annual gathering of cyber security decision makers and practitioners will feature experts and thought leaders from across the globe, who will share their knowledge and insights on the most critical issues facing businesses today. It will also feature a range of workshops, training courses, and much more. For more information, and to register, go here.

If an attacker takes control of a company’s DNS, they can easily gain control over open sources, redirect incoming e-mails, Web requests and authentication attempts, and create and validate SSL/TLS certificates.

So says Hakun Uzun, CEO of DNSSense, who will be presenting on “How is DNS-based security empowering digital transformation?”, at the ITWeb Security Summit 2022, to be held at the Sandton Convention Centre from 31 May to 2 June.

The ‘phone book of the Internet’

People often refer to DNS as the, “phone book of the Internet,” because every device on the Web, from PCs to the servers hosting Web sites, have an IP address that consists of a unique series of numbers. Connecting to another device requires knowing its associated IP address, much like connecting to another phone requires knowing its associated phone number.

According to Uzun, DNS was invented so that people wouldn’t have to remember long IP addresses.

“Instead, they could visit Web sites using human-friendly names like And because there are too many Web sites on the Internet for a computer to store a comprehensive list of corresponding domain names and IP addresses, this task is outsourced to designated DNS servers.”

He says people use DNS thousands of times a day without knowing it – every time they connect to a Web site, open a mobile phone app, or update software, their device queries DNS servers to find the IP address associated with the domain.

“That’s why we often refer to DNS as the foundation of the internet,” says Uzun.

A common thread

Uzun says although bad actors employ a variety of methods to compromise networks, the common thread is often DNS. “While DNS can bolster your security posture, don’t ignore the prospect of DNS as a threat vector. When someone controls your DNS, they can redirect users anywhere or commit data exfiltration.”

Organisations should implement DNS security to protect users, devices and other critical infrastructure.

Hakun Uzun, CEO of DNSSense.

He cites several types of attacks as examples, include DNS tunnelling, DNS poisoning (also known as DNS spoofing), and DNS cache poisoning. “There’s also DNS hijacking and distributed denial of service, or DDoS, attacks.”

DNS security refers to the safeguards and protective measures businesses deploy to prevent attackers from carrying out malicious attacks that use an entity’s DNS, and in fact, he says one of the most effective aspects of superior DNS security solutions is the ability to use the DNS layer to monitor and enforce outbound Web requests to ensure that users and IT systems are unable to access unacceptable or malicious Web sites.

Anticipate, prevent, detect

Uzun says DNS presents security and risk management leaders with some real opportunities to anticipate, prevent, detect and respond to prevailing threats.

“Organisations should implement DNS security to protect users, devices and other critical infrastructure.”

Since the DNS is an essential part of the Internet, it will always be a target for attackers, he explains. The best way to protect against these future attacks is to know the techniques used in the attacks and to identify potential entry points in advance (threat hunting).

“DNS security should be an integral part of the security plan,” Uzun ends. “Secure DNS server services provide Web protection and parental control by filtering and blocking unsafe, malicious, and unwanted Web sites.”

Delegates attending Uzun’s presentation, will learn why threat actors target DNS and why traditional protection is ineffective against evolving DNS threats. In addition, he will delve into what DNS-based security is, and how it can protect (digital) business.

See also