archives
5 New Year’s resolutions to combat cyber attacks
What changes should we commit to this year to keep our networks safe? Here are five resolutions for the coming year, including leveraging DNS.
Two can play at that game: Thinking like a malicious adversary
In this whiteboard session, learn how DNS is critical to your cybersecurity strategy and how to keep adversaries in mind when structuring your domains.
Are You Ready for the NIST 800-171 Compliance Deadline?
With only a few weeks until the December 31 deadline, are you scrambling to comply with NIST 800-171? Here’s how DNS-based security can help.
Making APIs Work for You (Part 2)
Part 2: Use APIs to get information from IP blocks, networks, and addresses, and learn how to search and filter data from BlueCat Address Manager.
Protect Your Network, Protect Your House: Takeaways from the Capital Cybersecurity Summit
On November 14 and 15, the Northern Virginia Technology Council hosted the second annual Capital Cybersecurity Summit in Virginia.
DNS: A Security Differentiator for System Integrators
At BlueCat’s first annual System Integrator Summit, companies in the Federal system integrator and partner community met to learn more about the strong…
Secure Electronic Voting Through DNS
With the November 7 election looming, state and local governments are scrambling to secure their electoral systems.
How DDoS attacks use DNS as a weapon
Bad actors know that DoS and DDoS attacks can use DNS as a weapon to cause spectacular web crashes that bring critical business services to their knees.
Making APIs Work for You (Part 1)
Part 1: Get all the basics on BlueCat APIs, including best practices and important tips on specific API calls and code workflows.
The Role of DNS in SCADA System Security
Supervisory Control and Data Acquisition (SCADA) systems are the most important networks you’ve never heard of.
Three things NIST taught us about DNS security
In this webinar, BlueCat turned to NIST computer scientist Scott Rose for advice on how network admins can harness the power of DNS to secure their systems.
Three personas of DNS in cybersecurity
Cyber attackers leverage DNS differently for different outcomes: DNS as a facilitator, hostage, or weapon. How is your DNS being hijacked?