Blog
Check out the latest in network management, cybersecurity, and DDI.

BlueCat Rolls Out First DNS Management Platform on AWS GovCloud
BlueCat is pleased to announce that its Adaptive DNS management platform is now the first AWS certified DNS management product in the AWS GovCloud region.

Is an IP address PII? The answer is nuanced
‘Is an IP address PII’ is a question with real implications for network admins. Explore how countries approach it and what companies should do about it.

Handling Breaches at the Bureau: A Conversation with Supervisory Special Agent Elvis Chan
FBI Supervisory Special Agent Elvis Chan who manages a squad discusses how they investigate national cybersecurity incidents

IPv6 DDoS attack is a warning to protect your network
The first IPv6 DDoS attack surfaced in 2018. While IPv6 is more secure than IPv4, if bad actors want to attack your network, they will find a way.

Cybersecurity Spotlight: Jeremy Conway, MAD Security
At BlueCat, we freely admit that we are not deep experts in cybersecurity, and we are certainly not as knowledgeable as our customers who man the front…

BlueCat DNS Edge Just Got More Powerful
The latest release of DNS Edge is now live and includes a number of new features like multi-namespace support for better routing, enhanced volumetric…

How Malicious Hackers are Competing for Notoriety at the 2018 Olympics
Over the past couple of weeks, all eyes have been on the athletes competing on the world’s biggest stage at the Winter Olympic Games.

Step into the Customer Portal: Getting the Most Out of BlueCat
Are you a BlueCat customer looking to get more out of your enterprise software?

APIs and data: The way to your IT organization’s heart
Show your security and network teams some love with DNS data to spot threats before they cause damage and BlueCat’s API to automate DNS services.

What we learned at Cisco Live Barcelona
Read up on BlueCat’s key takeaways from Cisco Live Barcelona 2018, including on the importance of DNS data to keep your network optimized and secure.

The Age of Network Automation: Takeaways from our New York User Group
What do you get when you combine DNS experts from some of North America’s leading brands? A collection of insights that serve as a compass for the…

Why Trust is the Real Target of Your Data Breach
As Dick Clarke reminded us in our recent webinar, the needs and concerns of today’s CISO are unique and ever-changing as we hear reports of a new data…

Five events to check out at Cisco Live in Barcelona
Catch BlueCat at Cisco Live EMEA in Barcelona from Jan. 29 to Feb. 2, 2018, to learn about the power of Adaptive DNS, plus five things not to miss!

BlueCat named Stevie Awards finalist
BlueCat is a 2018 Stevie Awards finalist for Customer Service Department of the Year. The final winner is determined by public vote, so cast your vote for…

Splunk, DNS logs, and why DNS data matters
Interested in downloading DNS Edge for Splunk? Download it from Splunkbase.

Make Your Point of Sale System a Point of Security
As the biggest season in retail winds down, Forever 21 was the latest retail target of a point of sale cyber attack, joining the likes of Chipotle and Game…

5 New Year’s resolutions to combat cyber attacks
What changes should we commit to this year to keep our networks safe? Here are five resolutions for the coming year, including leveraging DNS.

Two can play at that game: Thinking like a malicious adversary
In this whiteboard session, learn how DNS is critical to your cybersecurity strategy and how to keep adversaries in mind when structuring your domains.

Why the Cyber Threat Hunter Needs DNS
In our latest webinar in our cyber security series, we welcome Cyxtera Cyber Security Officer Chris Day.

Are You Ready for the NIST 800-171 Compliance Deadline?
With only a few weeks until the December 31 deadline, are you scrambling to comply with NIST 800-171? Here’s how DNS-based security can help.

3 Reasons to Tune in to “The Threat Hunter’s Newest Weapon: DNS Data”
This Wednesday, Chris Day, Chief Cybersecurity Officer at Cyxtera will be joining us for an exclusive webinar, “The Threat Hunter’s Newest Weapon: DNS…

The iPhone X Face ID Hack and the Weapon of Curiosity
In the era of large-scale breaches and cybersecurity protocols, even on the most basic level, everything needs a password.

When Was the Last Time You Trusted Anything Free?
Let’s say you’re shopping around for a new car. You’re checking out your options when you are presented with Car 1 and Car 2.

Protect Your Network, Protect Your House: Takeaways from the Capital Cybersecurity Summit
On November 14 and 15, the Northern Virginia Technology Council hosted the second annual Capital Cybersecurity Summit in Virginia.
Get in touch
We’re the DDI provider you’ve been looking for.
Drop us a line and let’s talk.