archives

The iPhone X Face ID Hack and the Weapon of Curiosity

In the era of large-scale breaches and cybersecurity protocols, even on the most basic level, everything needs a password.

Read more

When Was the Last Time You Trusted Anything Free?

Let’s say you’re shopping around for a new car. You’re checking out your options when you are presented with Car 1 and Car  2.

Read more

How the Medical University of South Carolina Became Future-Proof

The Medical University of South Carolina (MUSC) is complex, high performance environment.

Read more

The Cold Hard Facts Behind Free DNS

Organizations rely on DNS for critical business applications with many enterprises using a combination of DNS, DHCP and IPAM solutions, including free…

Read more

How Kohl’s Freed Themselves from Free Microsoft DNS

As one of America’s largest retail department store chains, Kohl’s manages a massive number of IP addresses.

Read more

Vote NO on Exposed Voter Data

Do you remember where you were between June 1 and June 12, 2017?

Read more

Breach, blame, repeat: The hard truths of today’s CISO

In this webinar, cybersecurity and counterterrorism expert DIck Clarke warns that it’s no longer a matter of if, but when, an IT breach will occur.

Read more

BlueCat Welcomes JISA Delegates to Toronto HQ

Whether it’s translating domain names to IP addresses, or translating English to Japanese, there is never a dull moment at BlueCat.

Read more

Unified Goals of Network Engineers and CISOs: User Group Takeaways

When you get senior network engineers from world-class enterprises like Coca-Cola, Cox Automotive and The Home Depot, in a room together – and toss in a…

Read more

BlueCat Among Canada’s Best Workplaces™ in Technology

It’s a good thing we’ve expanded our office space – we might need to install a trophy cabinet.

Read more