DNS archives
What you can learn from an NXDOMAIN response
At a basic level, an NXDOMAIN response means “that site does not exist.” But it can also provide critical clues about your network’s security.
What is DNS poisoning and how to prevent it
DNS poisoning (aka DNS cache poisoning or DNS spoofing) uses security gaps in the DNS protocol to redirect internet traffic to malicious websites.
Ease your transition to IPv6 DNS
Moving to IPv6 DNS may seem daunting. If you’re making the jump to IPv6, BlueCat’s platform is ready to help cushion your landing.
The key to successful security programs? Look to your business
Conducting security risk analysis is a challenge. Start with your business leaders, who can speak to their operations best.
Service Points for Secure, Automated, Resilient Networks
Remember when brick and mortar banks were the only option? It was pretty inconvenient. Now ATMs provide access to services everywhere at a fraction of the…
DNS over HTTPS: what, why, and who cares
Encrypting DNS queries and responses over HTTPS has long sparked robust debate, with interest from numerous stakeholders. Learn more with BlueCat.
Using BlueCat Adaptive DNS in the Cloud
This whitepaper describes the challenges that hybrid cloud presents for network teams, specifically related DNS, DHCP, and IP address management (DDI).
When to replace BIND DNS
BIND (Berkeley Internet Name Domain) is an open source solution for DNS which is still commonly used to manage network infrastructure on enterprises around…
Cloud DNS: Taming complexity in hybrid cloud
Public clouds handle their own DDI. But problems arise when applications have to access data or services through the native DDI of multiple environments.
Your IP address spreadsheet: A network menace
Are you still using a spreadsheet to manage IP addresses? IPAM is the only way to achieve secure, transparent, and efficient network management.
Bolster DNS security with BlueCat and Cisco Umbrella
Working together, BlueCat and Cisco Umbrella extend the breadth and depth of domain name system security across the enterprise.
Delivering from the Ground Up: Leveraging Core Infrastructure to Build Innovative IT Solutions
In this webinar, you’ll learn: The common challenges faced in delivering DDI projects to end-users The key criteria for a successful DDI implementation…