Network Security archives

Secure Electronic Voting Through DNS

With the November 7 election looming, state and local governments are scrambling to secure their electoral systems.

Read more

How DDoS attacks use DNS as a weapon

Bad actors know that DoS and DDoS attacks can use DNS as a weapon to cause spectacular web crashes that bring critical business services to their knees.

Read more

The Role of DNS in SCADA System Security

Supervisory Control and Data Acquisition (SCADA) systems are the most important networks you’ve never heard of.

Read more

Three things NIST taught us about DNS security

In this webinar, BlueCat turned to NIST computer scientist Scott Rose for advice on how network admins can harness the power of DNS to secure their systems.

Read more

DNS as Facilitator – A Naïve Resolver for Malware

Hackers are resourceful. They know that helpful DNS will always work to naively return an IP address when queried. DNS exists to connect clients to backend…

Read more

The Power of a Client-Facing DNS Firewall

Learn why Adaptive DNS is the foundation for scalable, secure networks and critical to all of your digital transformation strategies.

Read more

Is Network Resilience the New Metric for Federal Cybersecurity?

Here at the AFCEA Homeland Security conference, we’re hearing a very different tone on cyber security than in years past.

Read more

Elevate Toronto 2017

There is a major festival going on in Toronto where thousands of people clutch their show passes and fill theatres to fawn over their idols.

Read more

DNS and the Challenge of Advanced Persistent Threats

Most cyber attacks are the online equivalent of a smash-and-grab robbery.

Read more

Why Client Facing DNS Firewalls are Critical to Network Security

Ask any CISO what a perfect world looks like and you’ll no doubt hear, “Full network visibility to secure the enterprise with no possibility of…

Read more

Can traditional IT cut the cost of cybersecurity solutions?

Where is the line between traditional IT administration and cyber security operations?

Or is there a line at all?

Read more

Dispatch from DoDIIS 2017:  The Incredible Shrinking Decision Space

Here at the DoDIIS 2017 conference, we’re hearing a lot about the role of cybersecurity in so-called “fifth generation warfare” – a concept with direct…

Read more