Blog

Check out the latest in network management, cybersecurity, and DDI.
 
 
 
    Article

    How adversaries are using your DNS data

    Find out how much can you learn about a company and their employees simply through DNS data?

    Read more
    Article

    Know the eight most common DNS record types

    There are dozens of DNS record types. Understanding the most common ones can help you detect threats and keep on top of what’s happening on your network.

    Read more
    Article

    Snapshots from Cisco Barcelona 2020

    Even though Cisco Barcelona was just a week ago, can we say we already miss it? For the third year in a row, BlueCat made a splash at Cisco Live EMEA, the…

    Read more
    Article

    Leverage DNS for CMMC compliance

    Learn how DNS security plays into Cybersecurity Maturity Model Certification (CMMC) and how BlueCat’s visibility and control promotes compliance.

    Read more
    Article

    Why BlueCat remote jobs are inherently superior

    I used to talk about my status as a BlueCat remote employee in terms of addiction.  “I’m hooked.  I can never go back.” After four years of remote…

    Read more
    Webinar

    DNSSEC, DNS over HTTPS & DNS Flag Day – What’s the Difference?

    We rounded up industry experts to discuss the intersection of networking, cloud, storage, and virtualization. Here is their conversation.

    Read more
    Article

    The top four DNS response codes and what they mean

    Every DNS query gets a response. Stay on top of your network activity with BlueCat by understanding the four most common DNS response codes.

    Read more
    Article

    BlueCat recognized as Best Workplaces™ for Inclusion 2020

    Breaking down our three-pronged approach to an inclusive (and awesome) workplace culture.

    Read more
    Webinar

    IT Pros Debate: Guilty Networks, Speaking Up The Stack, and Essential Career Skills

    In the spirit of breaking down barriers, IT professionals discuss guilty networks, speaking up the stack, and essential career skills.

    Read more
    Article

    A future-ready network needs to support edge computing

    If the last decade has taught us anything, there’s not much we can predict. At one point, we even thought 4.2 billion IP addresses would be enough. Sorry,…

    Read more
    Article

    What you can learn from an NXDOMAIN response

    At a basic level, an NXDOMAIN response means “that site does not exist.” But it can also provide critical clues about your network’s security.

    Read more
    Article

    Trends that drove a decade of change in networking

    While some changes were minimal, others were monumental.

    Read more
    Article

    DNS automation: Adding host records with ServiceNow

    With the certified BlueCat DDI Service Catalog, you can automate adding host records in ServiceNow and streamline your IP address management.

    Read more
    Report

    Is the Gartner SASE model the future of networking?

    The Gartner SASE model foreshadows the convergence of network and security solutions, which will mean significant changes in network operations.

    Read more
    Article

    Protect your network from DNS hijacking

    Learn about the three types of DNS hijacking, how to protect your network, and how BlueCat’s platform can further enhance your network security.

    Read more
    Article

    What is DNS poisoning (DNS spoofing) and how to prevent it

    DNS poisoning (aka DNS cache poisoning or DNS spoofing) uses security gaps in the DNS protocol to redirect internet traffic to malicious websites.

    Read more
    Article

    What you missed at Move the Dial’s Global Summit

    Last week, 2800 people gathered in Toronto for the #movethedial Global Summit. With the  mission to advance the leadership and participation of all…

    Read more
    Article

    Ease your transition to IPv6 DNS

    Moving to IPv6 DNS may seem daunting. If you’re making the jump to IPv6, BlueCat’s platform is ready to help cushion your landing.

    Read more
    Article

    The key to successful security programs? Look to your business

    Conducting security risk analysis is a challenge. Start with your business leaders, who can speak to their operations best.

    Read more
    Article

    DoD’s JEDI cloud contract is awarded. Now what?

    Microsoft won DoD’s huge JEDI cloud contract (for now). BlueCat can help agencies prepare their networks for the coming migration to the cloud.

    Read more
    Article

    Tech Field Day 20: Everyone we’re psyched to see

    Tech Field Day brings IT pros together each year. Here’s who we’re psyched to meet (or see again–which is even sweeter) at this year’s event.

    Read more
    Article

    3 Takeaways from the “DNS over HTTPS and Beyond” Webinar with Paul Vixie

    Insights include the power of DNS, the challenges businesses face today, and the controversial DNS over HTTPS (and what it means for enterprises).

    Read more
    Article

    DNS over HTTPS: what, why, and who cares

    Encrypting DNS queries and responses over HTTPS has long sparked robust debate, with interest from numerous stakeholders. Learn more with BlueCat.

    Read more
    Article

    Paying it forward with BlueCat’s referral program

    If you’re more concerned with a career than a job, just any role won’t do. You’re taking into consideration a company culture and growth…

    Read more

    Get in touch

    We’re the DDI provider you’ve been looking for.
    Drop us a line and let’s talk.