**The New Normal: Building Resilient Infrastructure in a World of Sustained Cyber Attacks**

In recent years, the cybersecurity landscape has undergone a significant shift. Gone are the days of single, high-profile breaches that make headlines for weeks on end. Instead, we're seeing a sustained operational pressure that's pushing organizations to their limits. A group of senior security leaders recently gathered to discuss the year just gone, and what stood out was not a single defining breach or outage, but a steady drumbeat of activity: distributed denial of service (DDoS) traffic at the network edge, elevated DNS query volumes, persistent threats targeting authentication flows and APIs.

This new normal is characterized by coordinated campaigns that combine volumetric attacks, automated reconnaissance, and application layer abuse over extended periods. Global geo-political tensions are contributing to further instability on attack surfaces. The implications of this shift are profound, affecting not just technical architecture but also governance and regulatory accountability.

**The Rise of Multi-Terabit DDoS Attacks**

DDoS attacks are pushing into multi-terabit territory, fueled by sophisticated botnets and globally distributed infrastructure. However, bandwidth alone doesn't define the modern threat. Campaigns now layer volumetric traffic with slower, more targeted techniques such as API abuse, credential stuffing, and automated endpoint probing. Even when peak traffic subsides, low-level reconnaissance often continues. The objective is not simply disruption but discovery.

**The Challenges of Sustained Defensive Posture**

Mitigating a spike over several hours can be manageable, but sustaining defensive posture over days introduces operational fatigue and increases the likelihood of oversight. Systems designed for burst tolerance can struggle under prolonged load. Regulators are watching how organizations manage these incidents closely, requiring institutions to demonstrate their ability to withstand severe but plausible disruption and continue operating critical services.

**The Importance of DNS Resilience**

DNS is a critical operational control layer that's often forgotten in the midst of cybersecurity discussions. Recent outages have brought its importance to the forefront, with sustained pressure on DNS infrastructure globally. This includes volumetric query floods, random subdomain attacks designed to bypass validation, and malformed request patterns intended to degrade resolver performance.

**PKI Modernization and Trust**

Availability is only one dimension of resilience because integrity and trust sit alongside it. DNS operates in unison with public key infrastructure (PKI), which authenticates services, enables encrypted sessions, and underpins digital identity. If certificates expire unexpectedly, keys are poorly governed, or cryptographic standards become outdated, services fail and trust erodes.

**The Era of Sustained Cyber Pressure**

As the cybersecurity landscape continues to evolve, it's clear that sustained cyber pressure is now a structural feature of the digital economy. Cybersecurity leaders should treat multi-terabit DDoS attacks as credible baseline scenarios. DNS infrastructure should be tested for behavior under adversarial query patterns, and certificate and key management processes should be assessed with the same rigor as network controls.

**Executive Ownership of Resilience**

Boards and regulators are no longer asking whether attacks can be prevented entirely; they're asking whether critical services can remain available, secure, and trusted under continuous strain. This requires executive ownership of resilience, clarity around impact tolerances, and investment in infrastructure that underpins both availability and integrity.

In conclusion, the era of short-lived cyber incidents is fading, replaced by a landscape defined by coordination, persistence, and scale. Building infrastructure that can withstand sustained pressure is now the defining challenge of digital resilience. As organizations face this new reality, it's essential to prioritize DNS resilience, PKI modernization, and executive ownership of cybersecurity to stay online and stay trusted.

**About the Author**

Lakshmi Hanspal is the Global Chief Security Officer at Box, responsible for corporate, physical, and cyber security. She has extensive experience in data protection and privacy.