Big ValleyBig ValleyBig ValleyBig Valley
  • ABOUT
  • SERVICES
    • Brand Strategy
    • Marketing Strategy
    • Content Marketing
    • Corporate Communications
    • Digital and Social Marketing
    • Market Intelligence
  • CASE STUDIES
  • CULTURE
  • RESOURCES
    • Big Valley Marketing Blog
    • Pressing Matters Podcasts
    • Top Conversations in Tech
    • AI Research
  • CONTACT

DNS Security Evolution with Dr. Mockapetris

    Home Story + Content DNS Security Evolution with Dr. Mockapetris
    NextPrevious

    DNS Security Evolution with Dr. Mockapetris

    By Karen Burke | Story + Content, Tech Industry Events | Comments are Closed | 10 April, 2024 | 1

    With AI expected to dominate this year’s RSAC sessions and keynotes, we spoke with Dr. Paul Mockapetris, the inventor of the Domain Name System (DNS), about the role of AI on cybersecurity, the latest about DNS-based risks, and what it takes to become an impactful leader in the tech industry. Note: This interview has been lightly edited and condensed for clarity.

    AI

    AI itself is not new. There was a huge wave of AI around 1985 with the Strategic Computing Initiative, but in 1990 that wave wasn’t observable anymore. I think much of the current success of AI is due to silicon providing more processing power than any new deep understanding.

    AI aids both sides [defenders and adversaries] in the cyber conflict. While we’re going to have an era of surprises with AI and security, one area today where it is already helping adversaries is phishing attacks. AI-generated phishing attacks will typically pass the Turing Test substantially in 2024. AI will tailor the attacks with personal information. Users can no longer identify machine-generated copy from human-generated copy. There are significantly fewer clues, such as misspellings, etc. As a result, phishing attacks have become almost impossible to detect by inspecting the content.

    There is no playbook for AI right now and for the foreseeable future. I think the government needs to try and regulate it, but it’s not going to be easy.

    Cybersecurity

    First of all, you should not depend on any single tool. And remember that the security of your vendors is as important as your own. All the big names in technology have been hacked at one time or another. So, you have to be cognizant of that and try to figure out how to assemble your infrastructure so you don’t have a single point of failure so even if something is infected, perhaps harm will be prevented. Successful security works in layers that can protect each other; it works in series rather than parallel.

    DNS

    When I think of DNS, I have two axes for improvement.  First, improve what we have and make it more reliable and secure. The IETF is continuing to do that, and for example, there’s work to change how a parent set of domains coordinates with children, the so-called DELEG proposal. The second axis is: how do you create something that’s a totally new capability?  You need a capability that people really want so that they will actually use it and then the mechanism to do it. For example, I think we need to think about more ways to make DNS domain entities that can figure out how to cooperate with each other.

    Regarding threats, domain abuse is not going away, but having the government decide isn’t ideal because there’s no universal definition of “bad stuff.” Governments will continue to shut down obvious criminals.  But beyond that, the ruling authorities can’t, won’t, and shouldn’t impose who’s okay and not okay. Instead, we must figure out how to empower the end users to make those decisions. Typically, since maintaining threat intelligence is hard work, they will delegate to a trusted third party.

    As long as you have vulnerable devices, you will have DDoS. You can think about various ways to regulate against it, but DDoS is always going to be with us. And nation-state actors will continue to use botnets to commit crime because the cost of a botnet is fixed and the amount of damage you can do depends on how long it takes the FBI or whomever to take it down.

    Leadership

    To be an impactful leader, I think you first need to study the great ones. I’ve benefited incredibly from my colleagues and mentors including Dave Farber, Nicholas Negroponte, Bob Kahn and others.  Once you tell the people that you’re trying to lead what you want, you need to get mostly out of the way so they can do it. And remember that you’ve got to hire people that are smarter than you or at least know more about something than you do.

    Obtaining life balance in the tech industry is hard, but not impossible. People argue that success as a startup is really a sprint, not a marathon, or it’s really a marathon, not a sprint. I’ve heard both lectures many, many, many times, and I think the answer is that it’s both. You’ve just got to figure out how to save yourself for when the sprint matters.

    *****

    We’re attending RSA Conference, are you? Schedule a meeting with our team by reaching out to hireus@bigvalley.co.

    ai, artificial intelligence, cybersecurity, dns, RSA, RSA Conference, security

    Karen Burke

    More posts by Karen Burke

    Related Post

    • Q&A with Ben Waring, Director of Global PR & Communications, RSAC

      By Karen Burke | Comments are Closed

      As Director of Global PR & Communications for RSAC, Ben Waring has a unique vantage point to view how this important security conference is put together each year, from the speakers and topics and theRead more

    • Black Hat USA 2024 Key Takeaways

      By Karen Burke | Comments are Closed

      With Black Hat USA 2024 now officially over, it’s time to reflect on what we saw and heard. The event welcomed more than 20,000 in-person attendees at the Mandalay Bay Convention Center in Las Vegas.Read more

    • Black Hat 2024 Preview: Key Cybersecurity Trends and Insights

      By Karen Burke | Comments are Closed

      Cybersecurity Expert Tips for Making the Most of Black Hat USA 2024 As we head into a busy week at Black Hat USA, cybersecurity – and cybersecurity vendors – are making headlines. The recent DarkReadingRead more

    • The Art of Threat Research Storytelling

      By Karen Burke | Comments are Closed

      Black Hat USA 2024: Insights from Cybersecurity Storytelling Strategists While annual threat research reports like Verizon DBIR make big media splashes, the reality is  security vendors, reporters, and government agencies are doing threat research storytellingRead more

    • Key Takeaways From Content Marketing World 2025

      By Michael Weiss | Comments are Closed

      Last week at Content Marketing World in San Diego, I had the privilege of speaking about what I call the “five feet of fear”,  that brief but daunting walk from your seat to the stage.Read more

    NextPrevious

    Helping technology companies for ten years
    to grow, win, and lead through effective,
    expert-driven marketing and communications.

    Connect

    I want to hire Big Valley

    hireus@bigvalley.co


    I want to work for Big Valley

    workwithus@bigvalley.co

    Follow us
    • LinkedIn

    Recent Posts

    • New Social Platforms Series: Discord Poised for Passionate B2B Community Creation

      By Arianna Crawford, The Social Media Explorer The Big Valley Marketing New

      27 October, 2025
    • New Social Platforms Series: Can B2Bs Ignore Reddit’s Front Page of the Internet Vibes?

      By Arianna Crawford, The Social Media Explorer The Big Valley Marketing New

      8 October, 2025
    • Outputs vs. Outcomes: Why We Confuse Activity with Impact

      Dashboards are shiny. They make us feel productive, even strategic: charts tilting

      6 October, 2025
    Copyright 2024 Big Valley Marketing | All Rights Reserved
    • ABOUT
    • SERVICES
      • Brand Strategy
      • Marketing Strategy
      • Content Marketing
      • Corporate Communications
      • Digital and Social Marketing
      • Market Intelligence
    • CASE STUDIES
    • CULTURE
    • RESOURCES
      • Big Valley Marketing Blog
      • Pressing Matters Podcasts
      • Top Conversations in Tech
      • AI Research
    • CONTACT
    Big Valley