Network Security archives
How to choose the right DNS firewall for your network
Threat feeds, network integration, deployment, and placement are all critical aspects to consider when looking for the right DNS firewall. BlueCat can help.
Bolster DNS security with BlueCat and Cisco Umbrella
Working together, BlueCat and Cisco Umbrella extend the breadth and depth of domain name system security across the enterprise.
Effective network security starts with internal DNS
When cybersecurity teams think about the Domain Name System (DNS) at all, they’re most likely to think about it in terms of external web servers, not the…
Which top-level domains to block and how to do it right
Identifying malicious top-level domains to block is easy enough. But you can take it further with BlueCat to spot devices querying bad TLDs to begin with.
Case Study: DNS data identifies network performance issues
The Domain Name System (DNS) is a powerful tool for enhancing visibility into all aspects of a network. At an individual query level, DNS records are a…
Reduce attack surfaces with DNS
In this video, learn how to reduce your attack surface with BlueCat DNS Edge by setting client-level policies and locking down single-use devices.
Forensic investigation using DNS for faster incident response
In this video, learn how BlueCat DNS Edge provides investigative insight and faster responses for security breaches and helps reduce attack surfaces.
Cloud cybersecurity is a joint responsibility
Atlanta moved more of its enterprise to the cloud after a major ransomware attack. But simply moving to the cloud isn’t a cybersecurity strategy in and of…
Three Cloud Migration Myths Putting Organizations at Risk
Many organizations get so caught up in the promise of the cloud that they overlook the challenges associated with migrating to a new environment, and…
Why you should pay attention to DNS tunneling
DNS tunneling transmits information through the protocol that usually resolves network addresses. Your DNS data can provide clues to help keep it at bay.
The value of DNS response data for securing your network
Logging a DNS query only tells a fraction of the story. With Intelligent Security, we’ve changed the paradigm by logging DNS responses as well, uncovering…
Network vs Cybersecurity: Can’t We All Just Get Along?
In our latest cinematic endeavor, we dive into the minds of two seriously fed up network and cybersecurity professionals. If the video below triggered…