Posts by: Dan Hubbard, CTO

Do you have a security blind spot?

There has been some press recently on what professionals are calling the “DNS Blind Spot”. The basic message is that of all the security tools, products, and technologies deployed, visibility into the DNS layer is the one that is most under-utilized. With the growing sophistication and frequency of threats, DNS provides an incredible opportunity to monitor, alert, and prevent some of the most nefarious threats from getting in – and contain them from getting out.

To get a sense of just how ...

RSA Recap

Another year and another RSA Conference over and done with. It was a busy week for me and the entire OpenDNS team. I had opportunity to give a couple of talks, OpenDNS had a booth on the show floor, and we even hosted two different parties. Throughout the entire week I noted a number of general trends and themes that I thought I would share with our blog readers:

Endpoint software. There was a disproportionate number of solutions and vendors ...

Visualizing Attack Data: 2013 Review

According to Wikipedia, Visualization is any technique for creating images, diagrams, or animations to communicate a message. Visualization through imagery has been an effective way to communicate both abstract and concrete ideas since the dawn of man.

Due to the massive amount of data we are dealing with today, visualization is dramatically increasing in importance. By putting large amounts of data into visualizations, we can utilize our most powerful sixth sense to understand the data and turn it into information. By adding ...

Cryptolocker 3D Visualization

Cryptolocker is arguably the most effective and sophisticated piece of ransomware released to date. As we have previously outlined on this blog, our Security Graph has been categorizing and blocking Cryptolocker based on the relationships of the domains, the traffic, and patterns, which we score algorithmically.

Within our research lab we also have a 3D security visualization tool that allows us to view and model attacks with animations and high definition graphics. We decided to model the Cryptolocker attack, add ...

Running A Code-A-Thon

Last month OpenDNS hosted our own code-a-thon. Since it was such a great experience for our team, we wanted to share insight on our process, as well as a look at what went well and what we’ll be sure to improve on next time. 


 Planning the code-a-thon was pretty simple. We encouraged employees to work on a self-selected project for 24 hours, and only had a few rules: 

Code-a-Thon starts at 10:00 AM Thursday ends at 10:00 AM Friday You must work in ...