Network Security archives

How to choose the right DNS firewall for your network

Threat feeds, network integration, deployment, and placement are all critical aspects to consider when looking for the right DNS firewall. BlueCat can help.

Read more

Bolster DNS security with BlueCat and Cisco Umbrella

Working together, BlueCat and Cisco Umbrella extend the breadth and depth of domain name system security across the enterprise.

Read more

Effective network security starts with internal DNS

When cybersecurity teams think about the Domain Name System (DNS) at all, they’re most likely to think about it in terms of external web servers, not the…

Read more

Which top-level domains to block and how to do it right

Identifying malicious top-level domains to block is easy enough. But you can take it further with BlueCat to spot devices querying bad TLDs to begin with.

Read more

Case Study: DNS data identifies network performance issues

The Domain Name System (DNS) is a powerful tool for enhancing visibility into all aspects of a network.  At an individual query level, DNS records are a…

Read more

Reduce attack surfaces with DNS

In this video, learn how to reduce your attack surface with BlueCat DNS Edge by setting client-level policies and locking down single-use devices.

Read more

Forensic investigation using DNS for faster incident response

In this video, learn how BlueCat DNS Edge provides investigative insight and faster responses for security breaches and helps reduce attack surfaces.

Read more

Cloud cybersecurity is a joint responsibility

Atlanta moved more of its enterprise to the cloud after a major ransomware attack. But simply moving to the cloud isn’t a cybersecurity strategy in and of…

Read more

Three Cloud Migration Myths Putting Organizations at Risk

Many organizations get so caught up in the promise of the cloud that they overlook the challenges associated with migrating to a new environment, and…

Read more

Why you should pay attention to DNS tunneling

DNS tunneling transmits information through the protocol that usually resolves network addresses. Your DNS data can provide clues to help keep it at bay.

Read more

The value of DNS response data for securing your network

Logging a DNS query only tells a fraction of the story. With Intelligent Security, we’ve changed the paradigm by logging DNS responses as well, uncovering…

Read more

Network vs Cybersecurity: Can’t We All Just Get Along?

In our latest cinematic endeavor, we dive into the minds of two seriously fed up network and cybersecurity professionals. If the video below triggered…

Read more