Connect with us

Hi, what are you looking for?


Network Security

VeriSign Launches New DNSSEC Signing Service

VeriSign today launched a cloud based service to ease the implementation of Domain Name System Security Extensions (DNSSEC).

VeriSign today launched a cloud based service to ease the implementation of Domain Name System Security Extensions (DNSSEC).

The VeriSign DNSSEC Signing Service is being offered to registrars to help them incorporate signing and provisioning into their infrastructure, while reducing costs, complexity and the administrative burden associated with implementing DNSSEC support for their customers. The service is ideal for registrars that host their own DNS, but are not ready to invest in the engineering and infrastructure needed to sign domain names (zones) or manage keys for DNSSEC.

DNSSEC provides an additional layer of security to the Internet by protecting against cache poisoning and man-in-the-middle attacks, in which forged data is used to redirect unsuspecting users to fraudulent websites and unintended addresses. DNSSEC is becoming essential to maintaining trust in the Internet; however, implementing DNSSEC can be a complex process and faces many challenges.

The VeriSign DNSSEC Signing Service performs the initial cryptographic signing, the regular re-signing of zone resource records and the ongoing management of key rollover schedules and the associated zone re-signing. Registrars can use the VeriSign DNSSEC Signing Service for the initial signing of second-level domain names (zones) as well as the periodic resigning and the ongoing management of keys associated with the DNSSEC protocol.

Related Reading: Trouble Ahead – The Implementation Challenges for DNSSEC

Related Reading: Deploying DNSSEC – Four Ways to Prepare Your Enterprise for DNSSEC

Related Reading: Five Strategies for Flawless DNSSEC Key Management and Rollover

Advertisement. Scroll to continue reading.

Related Reading: The Missing Ingredients for DNSSEC Success

Related Reading: DNS Hijack – How to Avoid Being a Victim

Related Reading: First Step For The Internet’s next 25 years: Adding Security to the DNS

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Artificial Intelligence

ChatGPT is increasingly integrated into cybersecurity products and services as the industry is testing its capabilities and limitations.

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...