archives

5 New Year’s resolutions to combat cyber attacks

What changes should we commit to this year to keep our networks safe? Here are five resolutions for the coming year, including leveraging DNS.

Read more

Two can play at that game: Thinking like a malicious adversary

In this whiteboard session, learn how DNS is critical to your cybersecurity strategy and how to keep adversaries in mind when structuring your domains.

Read more

Are You Ready for the NIST 800-171 Compliance Deadline?

With only a few weeks until the December 31 deadline, are you scrambling to comply with NIST 800-171? Here’s how DNS-based security can help.

Read more

Making APIs Work for You (Part 2)

Part 2: Use APIs to get information from IP blocks, networks, and addresses, and learn how to search and filter data from BlueCat Address Manager.

Read more

Protect Your Network, Protect Your House: Takeaways from the Capital Cybersecurity Summit

On November 14 and 15, the Northern Virginia Technology Council hosted the second annual Capital Cybersecurity Summit in Virginia.

Read more

DNS: A Security Differentiator for System Integrators

At BlueCat’s first annual System Integrator Summit, companies in the Federal system integrator and partner community met to learn more about the strong…

Read more

Secure Electronic Voting Through DNS

With the November 7 election looming, state and local governments are scrambling to secure their electoral systems.

Read more

How DDoS attacks use DNS as a weapon

Bad actors know that DoS and DDoS attacks can use DNS as a weapon to cause spectacular web crashes that bring critical business services to their knees.

Read more

Making APIs Work for You (Part 1)

Part 1: Get all the basics on BlueCat APIs, including best practices and important tips on specific API calls and code workflows.

Read more

The Role of DNS in SCADA System Security

Supervisory Control and Data Acquisition (SCADA) systems are the most important networks you’ve never heard of.

Read more

Three things NIST taught us about DNS security

In this webinar, BlueCat turned to NIST computer scientist Scott Rose for advice on how network admins can harness the power of DNS to secure their systems.

Read more

Three personas of DNS in cybersecurity

Cyber attackers leverage DNS differently for different outcomes: DNS as a facilitator, hostage, or weapon. How is your DNS being hijacked?

Read more