Blog
Check out the latest in network management, cybersecurity, and DDI.

Protect your network from DNS hijacking
Learn about the three types of DNS hijacking, how to protect your network, and how BlueCat’s platform can further enhance your network security.

5 Ways Big Failures Grow from Accumulated Small Ones
Network engineers believe that outages, when they happen, usually come from unexpected causes, because if a network outage can be predicted, it can be…

What is DNS poisoning (DNS spoofing) and how to prevent it
DNS poisoning (aka DNS cache poisoning or DNS spoofing) uses security gaps in the DNS protocol to redirect internet traffic to malicious websites.

What you missed at Move the Dial’s Global Summit
Last week, 2800 people gathered in Toronto for the #movethedial Global Summit. With the mission to advance the leadership and participation of all…

Ease your transition to IPv6 DNS
Moving to IPv6 DNS may seem daunting. If you’re making the jump to IPv6, BlueCat’s platform is ready to help cushion your landing.

The key to successful security programs? Look to your business
Conducting security risk analysis is a challenge. Start with your business leaders, who can speak to their operations best.

DoD’s JEDI cloud contract is awarded. Now what?
Microsoft won DoD’s huge JEDI cloud contract (for now). BlueCat can help agencies prepare their networks for the coming migration to the cloud.

Tech Field Day 20: Everyone we’re psyched to see
Tech Field Day brings IT pros together each year. Here’s who we’re psyched to meet (or see again–which is even sweeter) at this year’s event.

3 Takeaways from the “DNS over HTTPS and Beyond” Webinar with Paul Vixie
Insights include the power of DNS, the challenges businesses face today, and the controversial DNS over HTTPS (and what it means for enterprises).

DNS over HTTPS: what, why, and who cares
Encrypting DNS queries and responses over HTTPS has long sparked robust debate, with interest from numerous stakeholders. Learn more with BlueCat.

Real Visibility Doesn’t Require Reaching for the Stars
Visibility has always been key to situational awareness. Imagine navigating the open ocean based on what stars could be seen, and where they were in the…

Paying it forward with BlueCat’s referral program
If you’re more concerned with a career than a job, just any role won’t do. You’re taking into consideration a company culture and growth…

Why Security Infrastructure Automation Needs Humans (And Vice Versa)
Calling something “autonomous” implies that it operates without human input. That’s a misguided notion. Take, for example, security infrastructure…

6 DNS Horror Stories that will Spook Your IT Team this Halloween
Working with DNS can be spooky. Here are 6 DNS horror stories to enjoy this Halloween, coming from IT teams just like yours.

How one BlueCat is contributing to the cybersecurity community
We know every October is Cybersecurity Awareness Month. Companies remind us how to spot phishing emails and create better passwords. The media tells us how…

IPv6 cheat-sheet, part 3: IPv6 multicast
Many IPv6 multicast addresses are well-known to software implementing IPv6, to simplify common routing needs.

Implementing Security Solutions to Support Your Business? Don’t Overlook These 3 Factors
In cybersecurity, a dangerous disconnect exists between what people think they know and what they actually know. Consider…

BlueCat Becomes Move The Dial Corporate Partner
BlueCat partners with Move The Dial to promote gender equality. Here’s what the partnership means and how you can support it.

DNS migration: Moving from homegrown BIND DNS to the BlueCat Adaptive DNS solution
In two recent posts, we talked about the operational downsides of homegrown BIND DNS infrastructures, and how it can stand in the way of digital…

How Security Infrastructure Automation Is Revolutionizing Cybersecurity
Cybersecurity is a top priority for organizations due to its increasingly important financial and public-facing ramifications. Experts predict…

How Brooklyn Nine-Nine S6E14 got cybersecurity all wrong
Brooklyn Nine-Nine’s writers have a great cybersecurity vocabulary, but not a great understanding of how cybersecurity works. BlueCat breaks it down.

How homegrown BIND DNS drags down digital transformation
BIND DNS is fine for small enterprises, but when things start to scale and become complex, a different feature set is required.

What Is Missing From Your Security Operations Strategy?
Countless companies consider cybersecurity a standalone issue. They view it as a task relegated for IT or a comparable department. Unfortunately,…

A Guide to Firewall Security in 2019
It’s no secret that firewall security is important. The online world is advancing at a record-breaking pace. And while the progress being made allows…
Get in touch
We’re the DDI provider you’ve been looking for.
Drop us a line and let’s talk.