Network Security

    For DNS server caching, what is the ideal TTL?

    Many factors affect how to set time to live (TTL) for DNS servers. Learn more, plus how BlueCat Edge’s TTL features can bolster your network.

    Read more
    NSA and CISA: Protective DNS key to network defense

    U.S. cyber agencies now point to protective DNS as a defense strategy, confirming what BlueCat already knew: DNS is critical to detecting network threats.

    Read more
    Customer situation brief on SUNBURST/Solorigate

    Learn more about the attack via the SolarWinds Orion platform and how BlueCat products use DNS to help protect customers against compromises like it.

    Read more
    On the road to platform hardening, consider a STIG

    Security Technical Implementation Guides standardize security configuration on networks, servers, and devices. BlueCat uses them and you can, too.

    Read more
    BlueCat’s DDI Adaptive Plugins and Applications help IT teams better leverage ServiceNow, Ansible, Microsoft, and more

    A growing suite of Adaptive Plugins and Applications will help automate existing BlueCat capabilities along with adjacent customer technologies.

    Read more
    How DNS Edge Enables Cloud Innovation without Complication

    The move to the cloud is fueling innovation, easing development and helping companies provide services to customers or enhance internal capabilities –…

    Read more
    To better see the threats on your network, try DNS

    DNS is a vector used in most cyber attacks. When it comes to DNS, BlueCat can enhance visibility, detection, and containment of threats to your network.

    Read more
    Webinar: Threat Protection

    BlueCat Solution Architect Steffen Probst discusses how intelligent security from BlueCat uses DNS to protect internal and external traffic against threats.

    Read more
    eBook: DNS & Cybersecurity Compliance

    At BlueCat, we know that DNS has a strong role to play in advancing both cybersecurity and compliance. But we also know that it’s not enough to simply say…

    Learn more
    eBook: DNS in the Cybersecurity Stack

    Malicious actors exploit DNS every day to establish command and control, navigate through networks, and exfiltrate data. his eBook will show you how DNS can…

    Learn more
    Domain Generation Algorithms 101

    Dissecting the malware technique that keeps threat hunters guessing. For cybersecurity professionals and threat hunters, it can feel like advanced…

    Read more
    Assisted Upgrade

    Making and completing an upgrade shouldn’t be a complex and difficult process. Organizations often spend significant time and resources facilitating…

    Learn more