Blog
Check out the latest in network management, cybersecurity, and DDI.

Why Educational Institutions Need Adaptive DNS
It’s no secret that post-secondary students can be some of the biggest tech whizzes out there – between all the different devices they use on campus, they…

NotPetya: DNS-leveraging Malware
Hot on the heels of last month’s WannaCry ransomware attack comes a new threat: NotPetya.

BlueCat Takes Cisco Live by Storm with Network Security
There, amongst all the bright lights and excitement in Las Vegas, was Cisco Live 2017.

Adaptive DNS – Dopamine for your Bimodal IT Strategy
A CIO walks into a crowded room. Is he going to be the life of the party, or sit quietly in the corner?

BlueCat Hackathon 3D
It’s been just over a year since Resolve to Innovate, our first ever in-house Hackathon, and we’re now gearing up for our third three-day hackathon,…

DNS helped stop the WannaCry ransomware attack
In 2017, the world was confronted by a ransomware attack that demonstrated how DNS visibility and control are key to any layered security strategy.

What CIOs can Learn from San Francisco’s Incredible Sinking Tower
I couldn’t help but chuckle today reading that Joe Montana, the *second greatest NFL quarterback of all time (ahem, Brady) is the latest person to sue the…

BlueCat: A Great Place to Work™
At BlueCat we’re proud of the innovation we are driving in the industry as well as the deep customer relationships we have forged with some of the largest…

Celebrating Our Women… and All Women
There has been a lot of press recently about companies who are struggling to build a culture of inclusivity and gender equality.

Are you working with the right DDI provider?
As more and more businesses transform through key IT initiatives such as cloud, ITaaS and automation, DNS can no longer be an afterthought.

Is your network ready for the holidays?
Retail is one of the most dynamic and challenging industries for IT. Here are four questions retail IT organizations should ask this holiday season.

Protect Against Malvertising with an Active Security Strategy
If you pay attention to the world of security you’ve probably heard about the upswing in a type of attack known as Malvertising.

Managing Device Connectivity on Campus
Higher education institutions have been dealing with BYOT for some 15 years, making them pioneers of this massive technology transformation.

The Dyn DNS DDoS Attack, and What to Do About It
The Dyn Attack Explained On October 21 2016, Dyn, a major internet Domain Name System (DNS) service provider, was attacked. This attack used a massive…

No Compromise Network Service on the AWS Cloud
The time to build and implement cloud strategies is now and BlueCat DNS for AWS can help to ensure unification into your current network.

BlueCat Scores Top Marks in Company Culture, Earns Great Place to Work™
It’s official, BlueCat is now certified as a GREAT WORKPLACE by Great Place to Work® Canada. Earning this achievement was no small feat – the process…

Five Tips to Reduce Dwell Time
Dwell time is arguably the most accurate indicator of an enterprise’s security.

Pokemon Go: When Cybersecurity “Breaches” Real Life
Many of you may have recently seen what appear to be zombies roaming the planet in search of their next victim.

Top Security Issues for the C-Suite: Q&A with BlueCat’s Director of Cybersecurity Solutions
Security continues to be top of mind for all organizations. Threats are more pervasive, sophisticated and appear as headlines in the news on a regular…

Take your PCI compliance to the next level
Think about how many times each day you pull a credit or debit card out of your wallet to pay for gas, groceries, a cup of coffee, or a new pair of shoes.

Passwords aren’t going anywhere anytime soon, so make sure you have a good one
Years ago, futurists predicted many advances such as flying cars, teleportation, a cure for old age to name a few things that would be available by now.…

BlueCat Hackathon: Blows expectations out of the water
Think of a software feature you can’t remember life without. It can be anything: The “Like” button on Facebook, tagging in social media comments, the…

Managing Cyber Attacks in the Health Care Industry
The health care industry is more susceptible to cyber attacks than any other industry today.

IT Strategy: Building Business Relevance- Kroger’s CIO did.
A solid IT strategy and the right leadership mindset are critical for success
…
Get in touch
We’re the DDI provider you’ve been looking for.
Drop us a line and let’s talk.