DNS is easily recruited as a naive messenger for malicious cyber activity. ‘DNS as Hostage’ is the 2nd in this 3-part series by BlueCat.
Powerful, software-driven DNS capabilities for Microsoft Azure Cloud
Part 1: Get all the basics on BlueCat APIs, including best practices and important tips on specific API calls and code workflows.
Learn why Adaptive DNS is the foundation for scalable, secure networks and critical to all of your digital transformation strategies
Scott Penney, Director of Cybersecurity Solutions at BlueCat, talks to Scott Rose, co-author of the NIST Secure Deployment Guide for DNS, about securing…
Find out why companies like Coca Cola, Home Depot, and TJX made the switch from VitalQIP to BlueCat from our migration experts
Andrew Wertkin, BlueCat CTO, talks to Cerner and Dell about the core business drivers for implementing network virtualization and the impact of moving to a…
DNS Edge Use Case – Compromised IOT Device
Scott Penney, Director of Cybersecurity Solutions at BlueCat, discusses how DNS data can expose the enemy within your network
BlueCat offers a full curriculum of technical training to provide your staff with the knowledge and skills they need
Understanding DDI can be challenging.
All that jargon. All those acronyms. It’s why we’ve written an A-Z of DNS-related terms. You’ll never mix up ‘NSD’ and ‘NTP’ at a dinner party again…