Among cyber-attack techniques, what is a DGA?
What is a DGA? To evade detection, they churn out domain names and IP addresses for malware command and control servers. Learn more with BlueCat.
Last updated: March 21, 2025

Published in:
Published on: June 4, 2021

Jeffrey Ip has worked in software engineering for 16 years. He has focused on leadership within technology research and development at several companies including Rogers, BlackBerry, and BlueCat Networks. He has been responsible for technical architecture, product delivery, fiscal planning, strategic innovation, and organizational management. His current interests include entrepreneurship and artificial intelligence.
Related content

Unlock DNS Redundancy with BlueCat Micetro’s xDNS
Discover how BlueCat Micetro’s xDNS Redundancy simplifies hybrid cloud DNS management, providing seamless redundancy, robust protection against DNS…

Three technical reasons to let go of legacy tools and unify your DDI
Learn with BlueCat how security by design, cloud integration, and API programmability offer three technical reasons to adopt Unified DDI.

Combine BlueCat Integrity with LiveAction network observability for total awareness
Shift to proactive, intelligent network operations when you combine a DDI foundation with network performance monitoring solutions.

Micetro simplifies hybrid cloud DNS and IP address management
Learn how Micetro can help you simplify and streamline DNS and IP address management across hybrid and multicloud environments.