Blog
Check out the latest in network management, cybersecurity, and DDI.

APIs and data: The way to your IT organization’s heart
Show your security and network teams some love with DNS data to spot threats before they cause damage and BlueCat’s API to automate DNS services.

What we learned at Cisco Live Barcelona
Read up on BlueCat’s key takeaways from Cisco Live Barcelona 2018, including on the importance of DNS data to keep your network optimized and secure.

The Age of Network Automation: Takeaways from our New York User Group
What do you get when you combine DNS experts from some of North America’s leading brands? A collection of insights that serve as a compass for the…

Why Trust is the Real Target of Your Data Breach
As Dick Clarke reminded us in our recent webinar, the needs and concerns of today’s CISO are unique and ever-changing as we hear reports of a new data…

Five events to check out at Cisco Live in Barcelona
Catch BlueCat at Cisco Live EMEA in Barcelona from Jan. 29 to Feb. 2, 2018, to learn about the power of Adaptive DNS, plus five things not to miss!

BlueCat named Stevie Awards finalist
BlueCat is a 2018 Stevie Awards finalist for Customer Service Department of the Year. The final winner is determined by public vote, so cast your vote for…

Splunk, DNS logs, and why DNS data matters
Interested in downloading DNS Edge for Splunk? Download it from Splunkbase.

Make Your Point of Sale System a Point of Security
As the biggest season in retail winds down, Forever 21 was the latest retail target of a point of sale cyber attack, joining the likes of Chipotle and Game…

5 New Year’s resolutions to combat cyber attacks
What changes should we commit to this year to keep our networks safe? Here are five resolutions for the coming year, including leveraging DNS.

Two can play at that game: Thinking like a malicious adversary
In this whiteboard session, learn how DNS is critical to your cybersecurity strategy and how to keep adversaries in mind when structuring your domains.

Why the Cyber Threat Hunter Needs DNS
In our latest webinar in our cyber security series, we welcome Cyxtera Cyber Security Officer Chris Day.

Are You Ready for the NIST 800-171 Compliance Deadline?
With only a few weeks until the December 31 deadline, are you scrambling to comply with NIST 800-171? Here’s how DNS-based security can help.

3 Reasons to Tune in to “The Threat Hunter’s Newest Weapon: DNS Data”
This Wednesday, Chris Day, Chief Cybersecurity Officer at Cyxtera will be joining us for an exclusive webinar, “The Threat Hunter’s Newest Weapon: DNS…

The iPhone X Face ID Hack and the Weapon of Curiosity
In the era of large-scale breaches and cybersecurity protocols, even on the most basic level, everything needs a password.

When Was the Last Time You Trusted Anything Free?
Let’s say you’re shopping around for a new car. You’re checking out your options when you are presented with Car 1 and Car 2.

Protect Your Network, Protect Your House: Takeaways from the Capital Cybersecurity Summit
On November 14 and 15, the Northern Virginia Technology Council hosted the second annual Capital Cybersecurity Summit in Virginia.

How the Medical University of South Carolina Became Future-Proof
The Medical University of South Carolina (MUSC) is complex, high performance environment.

The Cold Hard Facts Behind Free DNS
Organizations rely on DNS for critical business applications with many enterprises using a combination of DNS, DHCP and IPAM solutions, including free…

How Kohl’s freed Themselves from free Microsoft DNS
As one of America’s largest retail department store chains, Kohl’s manages a massive number of IP addresses.

DNS: A Security Differentiator for System Integrators
At BlueCat’s first annual System Integrator Summit, companies in the Federal system integrator and partner community met to learn more about the strong…

Vote NO on Exposed Voter Data
Do you remember where you were between June 1 and June 12, 2017?

Secure Electronic Voting Through DNS
With the November 7 election looming, state and local governments are scrambling to secure their electoral systems.

Horror Stories from Microsoft DNS Users
What is your worst nightmare?
A break-in to your home while you’re asleep? Falling into a pit of snakes à la Indiana Jones?

How DDoS attacks use DNS as a weapon
Bad actors know that DoS and DDoS attacks can use DNS as a weapon to cause spectacular web crashes that bring critical business services to their knees.
Get in touch
We’re the DDI provider you’ve been looking for.
Drop us a line and let’s talk.