Blog
Check out the latest in network management, cybersecurity, and DDI.

Andrew Wertkin & Farsight CEO Paul Vixie Unpack Mozart Malware & DNS over HTTPS News
BlueCat’s Andrew Wertkin and Farsight CEO Paul Vixie break down the headlines.

BlueCat takes DNS training to the next level
DNS training is a key part of any core infrastructure transformation. BlueCat has a training model that gives your team all the skills they need.

What DNS data says about IoT devices in your home
What are all those IoT devices in your home actually doing on your home network? We ran a little test to find out, and found some interesting info.

The .ORG Domain Sale: Explained
Private equity firm Ethos Capital plans to buy the domain registry responsible for .org domains. Here’s why this matters.

How adversaries are using your DNS data
Find out how much can you learn about a company and their employees simply through DNS data?

Know the eight most common DNS record types
There are dozens of DNS record types. Understanding the most common ones can help you detect threats and keep on top of what’s happening on your network.

Snapshots from Cisco Barcelona 2020
Even though Cisco Barcelona was just a week ago, can we say we already miss it? For the third year in a row, BlueCat made a splash at Cisco Live EMEA, the…

Leverage DNS for CMMC compliance
Learn how DNS security plays into Cybersecurity Maturity Model Certification (CMMC) and how BlueCat’s visibility and control promotes compliance.

Why BlueCat remote jobs are inherently superior
I used to talk about my status as a BlueCat remote employee in terms of addiction. “I’m hooked. I can never go back.” After four years of remote…

DNSSEC, DNS over HTTPS & DNS Flag Day – What’s the Difference?
We rounded up industry experts to discuss the intersection of networking, cloud, storage, and virtualization. Here is their conversation.

The top four DNS response codes and what they mean
Every DNS query gets a response. Stay on top of your network activity with BlueCat by understanding the four most common DNS response codes.

BlueCat recognized as Best Workplaces™ for Inclusion 2020
Breaking down our three-pronged approach to an inclusive (and awesome) workplace culture.

IT Pros Debate: Guilty Networks, Speaking Up The Stack, and Essential Career Skills
In the spirit of breaking down barriers, IT professionals discuss guilty networks, speaking up the stack, and essential career skills.

A future-ready network needs to support edge computing
If the last decade has taught us anything, there’s not much we can predict. At one point, we even thought 4.2 billion IP addresses would be enough. Sorry,…

What you can learn from an NXDOMAIN response
At a basic level, an NXDOMAIN response means “that site does not exist.” But it can also provide critical clues about your network’s security.

Trends that drove a decade of change in networking
While some changes were minimal, others were monumental.

DNS automation: Adding host records with ServiceNow
With the certified BlueCat DDI Service Catalog, you can automate adding host records in ServiceNow and streamline your IP address management.

Is the Gartner SASE model the future of networking?
The Gartner SASE model foreshadows the convergence of network and security solutions, which will mean significant changes in network operations.

Protect your network from DNS hijacking
Learn about the three types of DNS hijacking, how to protect your network, and how BlueCat’s platform can further enhance your network security.

What is DNS poisoning (DNS spoofing) and how to prevent it
DNS poisoning (aka DNS cache poisoning or DNS spoofing) uses security gaps in the DNS protocol to redirect internet traffic to malicious websites.

What you missed at Move the Dial’s Global Summit
Last week, 2800 people gathered in Toronto for the #movethedial Global Summit. With the mission to advance the leadership and participation of all…

Ease your transition to IPv6 DNS
Moving to IPv6 DNS may seem daunting. If you’re making the jump to IPv6, BlueCat’s platform is ready to help cushion your landing.

The key to successful security programs? Look to your business
Conducting security risk analysis is a challenge. Start with your business leaders, who can speak to their operations best.

DoD’s JEDI cloud contract is awarded. Now what?
Microsoft won DoD’s huge JEDI cloud contract (for now). BlueCat can help agencies prepare their networks for the coming migration to the cloud.
Get in touch
We’re the DDI provider you’ve been looking for.
Drop us a line and let’s talk.