Blog

Check out the latest in network management, cybersecurity, and DDI.
 
 
 
    Article

    BlueCat integrates with Cisco ACI to deliver enhanced visibility and centralized management

    Built with BlueCat’s API and DNS automation platform, the integration allows for discovering and configuring endpoints discovered by Cisco ACI.

    Read more
    Article

    DNS Integrity: The Need for Speed

    This past month we’ve released new versions of our DNS Integrity™ solutions that are all about empowering our customers to automate their…

    Read more
    Article

    BlueCat’s Declassified Cisco Survival Guide

    So, you’re heading to Cisco Live. That’s great! But before you make your way over there, give this handy guide a read to ensure that you have the best…

    Read more
    Article

    Key Takeaways: Gartner Security and Risk Management Summit

    Cybersecurity is on everybody’s mind these days, and people are beginning to realize that traditional security is simply not enough. It appears as though…

    Read more
    Article

    JEDI will ease DOD’s FITARA woes, but when?

    The latest FITARA scorecard released by the House Oversight Committee criticizes the Department of Defense yet again.  Of the eight categories covered in…

    Read more
    Article

    What DOD’s JEDI Cloud Contract Means for Your DNS

    Now that Microsoft has won the big DOD JEDI cloud contract, we’re looking ahead to the migration process and the challenges DOD agencies are likely to…

    Read more
    Article

    BlueCat is part of the AWS Public Sector Partner Program

    BlueCat is now part of the AWS Public Sector Partner Program. BlueCat’s DNS Integrity and Edge are seamlessly integrated with AWS.

    Read more
    Article

    How to Prepare DNS Infrastructure for a JEDI Cloud Migration

    Now that the DOD JEDI cloud contract has finally been awarded, DOD agencies are starting to plan for their transition to the Microsoft Azure cloud.…

    Read more
    Article

    Cybersecurity Spotlight: Matt Ahrens, Security Engineer at Coalition

    Matt Ahrens, Security Engineer at Coalition You’re reading the third post in our Cybersecurity Spotlight series. If you haven’t already, you can…

    Read more
    Article

    Make Point of Sale security a reality with DNS

    You may not be intimately familiar with Point of Sale (POS) systems but unless you’ve been living under a rock, you’ve definitely used them. They’re…

    Read more
    Article

    DNS Edge: Looking Back, and Looking Forward

    It’s been just over one year since we released DNS Edge, BlueCat’s DNS-based security solution. In that time we’ve seen our customers use it to…

    Read more
    Article

    Rise of the Rogue Cloud: The Fundamental Security Mistake Enterprises Make and How to Correct It

    Development teams, especially at the world’s largest organizations, move at a lightning pace. Not just to keep their businesses competitive, but also to…

    Read more
    Article

    BlueCat: Best Workplaces™ in Canada

      This past year has been extremely exciting for BlueCat, from our swanky new Toronto headquarters to our latest executive appointments, we are extremely…

    Read more
    Article

    A Smart, Secure Approach To Smart Cities

    Cities are getting smarter and smarter. Whether it’s simplifying data collection, revamping the voting process, or installing smart traffic lights to…

    Read more
    Article

    On Hackers in Hoodies With Sean Plankey

    You’re reading the Cybersecurity Spotlight series, where we profile leaders in security and their insights.

    Read more
    Article

    “It’s Not Our Product. It’s Our People”: BlueCat’s Secret to Success

    If you consider what’s at the heart of BlueCat’s success, you’ll realize quickly that you’re asking the wrong question. The question is not what…

    Read more
    Article

    BlueCat Rolls Out First DNS Management Platform on AWS GovCloud

    BlueCat is pleased to announce that its Adaptive DNS management platform is now the first AWS certified DNS management product in the AWS GovCloud region.…

    Read more
    Article

    Is an IP address PII? The answer is nuanced

    ‘Is an IP address PII’ is a question with real implications for network admins. Explore how countries approach it and what companies should do about it.

    Read more
    Article

    Handling Breaches at the Bureau: A Conversation with Supervisory Special Agent Elvis Chan

    We recently had the privilege of sitting down with FBI Supervisory Special Agent Elvis Chan who manages a squad responsible for investigating national…

    Read more
    Article

    IPv6 DDoS attack is a warning to protect your network

    The first IPv6 DDoS attack surfaced in 2018. While IPv6 is more secure than IPv4, if bad actors want to attack your network, they will find a way.

    Read more
    Article

    Cybersecurity Spotlight: Jeremy Conway, MAD Security

    At BlueCat, we freely admit that we are not deep experts in cybersecurity, and we are certainly not as knowledgeable as our customers who man the front…

    Read more
    Article

    BlueCat DNS Edge Just Got More Powerful

    The latest release of DNS Edge is now live and includes a number of new features like multi-namespace support for better routing, enhanced volumetric…

    Read more
    Article

    How Malicious Hackers are Competing for Notoriety at the 2018 Olympics

    Over the past couple of weeks, all eyes have been on the athletes competing on the world’s biggest stage at the Winter Olympic Games.

    Read more
    Article

    Step into the Customer Portal: Getting the Most Out of BlueCat

    Are you a BlueCat customer looking to get more out of your enterprise software?

    Read more

    Get in touch

    We’re the DDI provider you’ve been looking for.
    Drop us a line and let’s talk.

    Modern network complexities can introduce security risks, operational risks, and create huge operational expense for your organization when not properly managed. Join our webinar on February 26 to learn how BlueCat helps you augment your Cisco implementations.