Blog

Check out the latest in network management, cybersecurity, and DDI.

 
 
 
    Article

    The 3 Types of DNS Security

    Cybersecurity professionals are starting to move beyond mere DNSSEC towards leveraging DNS data, as part of a layered protection strategy.

    Read more
    Article

    DNS Edge July Release Enables Hybrid Cloud and More

    BlueCat continues its commitment and support of cloud-based infrastructures by extending BlueCat DNS Edge™ visibility, control, and detection capabilities…

    Read more
    Article

    Three User Groups, Three Chances to Reflect

    As proud DNS geeks, doing our homework is something we’re quite accustomed to. Recently, we hosted three BlueCat User Groups in order to get to know our…

    Read more
    Article

    What DOD Can Do Now to Prep for the JEDI Cloud

    The JEDI program is a critical strategic investment for DOD – one that has strong leadership support. Now that the contract is awarded, are DOD agencies…

    Read more
    Article

    DNSSEC vs DNS security: What’s the difference?

    DNSSEC validates DNS queries and responses, while DNS security leverages DNS data to better secure your network. Learn how they’re different with BlueCat.

    Read more
    Article

    DNS Security in Six Star Wars Memes

    Are you a Star Wars fan? Here are six memes that accurately depict DNS security- can you relate?

    Read more
    Article

    Cisco Live Orlando: our key takeaways

    Read up on BlueCat’s key takeaways from Cisco Live Orlando 2018, including the role DNS plays to bolster network security and detect threats.

    Read more
    Article

    Why Microsoft DNS Isn’t Appropriate for the JEDI Cloud

    While Microsoft DNS may be functioning just fine, you‚Äôll soon find yourself running into problems if you use it for your cloud migration. Here’s why.

    Read more
    Article

    BlueCat integrates with Cisco ACI to deliver enhanced visibility and centralized management

    Built with BlueCat’s API and DNS automation platform, the integration allows for discovering and configuring endpoints discovered by Cisco ACI.

    Read more
    Article

    DNS Integrity: The Need for Speed

    This past month we’ve released new versions of our DNS Integrity™ solutions that are all about empowering our customers to automate their…

    Read more
    Article

    BlueCat’s Declassified Cisco Survival Guide

    Heading to Cisco Live? Read our helpful guide to have the best experience possible. While you’re there, come stop by booth #1919 to say hi!

    Read more
    Article

    Key Takeaways: Gartner Security and Risk Management Summit

    At our recent visit to Gartner Security and Risk Management Summit 2018, we gained some key insights into how the approach to cybersecurity is evolving:

    Read more
    Article

    JEDI will ease DOD’s FITARA woes, but when?

    The latest FITARA scorecard released by the House Oversight Committee criticizes the Department of Defense yet again.  Of the eight categories covered in…

    Read more
    Article

    What DOD’s JEDI Cloud Contract Means for Your DNS

    This is the second installment in a four-part series on the JEDI cloud. Come for the knowledge, stay for the Star Wars references.

    Read more
    Article

    BlueCat is part of the AWS Public Sector Partner Program

    BlueCat is now part of the AWS Public Sector Partner Program. BlueCat’s DNS Integrity and Edge are seamlessly integrated with AWS.

    Read more
    Article

    How to Prepare DNS Infrastructure for a JEDI Cloud Migration

    The Department of Defense is about to award the JEDI contract ‚Äì and this means that agencies need to get ready for cloud migration. This episode…

    Read more
    Article

    Cybersecurity Spotlight: Matt Ahrens, Security Engineer at Coalition

    This Cybersecurity Spotlight, Matt Ahrens, a security engineer for Coalition talks cybersecurity insurance coverage for small and medium businesses.

    Read more
    Article

    Make Point of Sale security a reality with DNS

    Point-of-Sale systems are used to process a ton of customer transactions. But what happens when convenience gets in the way of security?

    Read more
    Article

    DNS Edge: Looking Back, and Looking Forward

    It’s been just over one year since we released DNS Edge, BlueCat’s DNS-based security solution. We checked in with our CTO, Andrew Wertkin, to get his…

    Read more
    Article

    Rise of the Rogue Cloud: The Fundamental Security Mistake Enterprises Make and How to Correct It

    What happens when time pressures lead to development teams accessing rogue clouds? Here’s the lowdown on how IT visibility can protect your organization.

    Read more
    Article

    BlueCat: Best Workplaces™ in Canada

      This past year has been extremely exciting for BlueCat, from our swanky new Toronto headquarters to our latest executive appointments, we are extremely…

    Read more
    Article

    A Smart, Secure Approach To Smart Cities

    Smart cities will soon become essential. But without a plan that accounts for both infrastructure capacity and security, investments can easily go awry.

    Read more
    Article

    On Hackers in Hoodies With Sean Plankey

    You’re reading the Cybersecurity Spotlight series, where we profile leaders in security and their insights.

    Read more
    Article

    “It’s Not Our Product. It’s Our People”: BlueCat’s Secret to Success

    If you dive deep into what’s at the heart of BlueCat’s success, you’ll realize that you’re asking the wrong question. The real question is who.

    Read more

    Get in touch

    We’re the DDI provider you’ve been looking for.
    Drop us a line and let’s talk.