"Eliminate blindspots with protective DNS" (ENG)
May 30th
14:55
We will address common challenges of traditional cybersecurity architectures, such as diverse environments, human-based vulnerabilities, and unorthodox attack vectors. Over 90% of malware uses DNS — so why not stop it there? We will present a DNS-based solution that utilizes worldwide and regional threat defense to stay one step ahead of threat actors. Learn how you can effectively expand your perimeter and fortify your defenses without disrupting your users.

Vladimir Spurny

Whalebone Technical consultant

Marine aquarist and technical consultant at Whalebone. He takes care of clients from both the private and public sectors throughout the implementation process and the lifecycle of a product that secures network traffic at the DNS protocol level.

We use cookies to support your experience on our website. By continuing to use our site, you agree to our use of cookies.