Network Security archives

DNS Security Case Study: Federal System Integrator

Here’s how BlueCat brought complete visibility and control over DNS infrastructure to a Federal system integrator.

Read more

Bolster defense-in-depth with BlueCat threat feeds

Network security products are only as good as the threat intelligence you feed into them. Here are BlueCat’s threat feed options.

Read more

BlueCat-Illusive integration enables effective deception

Thrive on deception, and protect your network with an Illusive Networks integrated Adaptive DNS platform from BlueCat.

Read more

Network security

Transform DNS from your biggest threat vector into your first line of defense.

Learn more

What DNS data says about IoT devices in your home

What are all those IoT devices in your home actually doing on your home network? We ran a little test to find out, and found some interesting info.

Read more

How adversaries are using your DNS data

Find out how much can you learn about a company and their employees simply through DNS data?

Read more

Leverage DNS for CMMC compliance

Learn how DNS security plays into Cybersecurity Maturity Model Certification (CMMC) and how BlueCat’s visibility and control promotes compliance.

Read more

The top four DNS response codes and what they mean

Every DNS query gets a response. Stay on top of your network activity with BlueCat by understanding the four most common DNS response codes.

Read more

Is the Gartner SASE model the future of networking?

The Gartner SASE model foreshadows the convergence of network and security solutions, which will mean significant changes in network operations.

Read more

Protect your network from DNS hijacking

Learn about the three types of DNS hijacking, how to protect your network, and how BlueCat’s platform can further enhance your network security.

Read more

What is DNS poisoning and how to prevent it

DNS poisoning (aka DNS cache poisoning or DNS spoofing) uses security gaps in the DNS protocol to redirect internet traffic to malicious websites.

Read more

How Brooklyn Nine-Nine S6E14 got cybersecurity all wrong

Brooklyn Nine-Nine’s writers have a great cybersecurity vocabulary, but not a great understanding of how cybersecurity works. BlueCat breaks it down.

Read more