Showing content for author: Jeffrey Ip

1 post

Among cyber-attack techniques, what is a DGA?

What is a DGA? To evade detection, they churn out domain names and IP addresses for malware command and control servers. Learn more with BlueCat.

Read more

Modern network complexities can introduce security risks, operational risks, and create huge operational expense for your organization when not properly managed. Join our webinar on February 26 to learn how BlueCat helps you augment your Cisco implementations.