Showing content for :

300 posts

The role of DNS in CMMC compliance

This datasheet provides a quick overview of how DNS security plays into the CMMC controls, and how BlueCat promotes compliance.

Read more

Know the eight most common DNS record types

There are dozens of DNS record types. Understanding the most common ones can help you detect threats and keep on top of what’s happening on your network.

Read more

Leverage DNS for CMMC compliance

Learn how DNS security plays into Cybersecurity Maturity Model Certification (CMMC) and how BlueCat’s visibility and control promotes compliance.

Read more

Cisco DNS Defense + DNS Edge Product Feature Demo

Deep dive into a user and managed device to learn how the integration between Cisco DNS Defense and BlueCat’s DNS Edge enables you to detect, investigate,…

Read more

DNSSEC, DNS over HTTPS & DNS Flag Day – What’s the Difference?

We rounded up industry experts to discuss the intersection of networking, cloud, storage, and virtualization. Here is their conversation.

Read more

SASE Hot Take with Andrew Wertkin & Jim Williams

Play video Gartner’s SASE convergence model has been creating quite a buzz in the industry. But what does it DNS have to do with it? Turns out, DNS is a…

Read more

What you can learn from an NXDOMAIN response

At a basic level, an NXDOMAIN response means “that site does not exist.” But it can also provide critical clues about your network’s security.

Read more

What is DNS poisoning (DNS spoofing) and how to prevent it

DNS poisoning (aka DNS cache poisoning or DNS spoofing) uses security gaps in the DNS protocol to redirect internet traffic to malicious websites.

Read more

Ease your transition to IPv6 DNS

Moving to IPv6 DNS may seem daunting. If you’re making the jump to IPv6, BlueCat’s platform is ready to help cushion your landing.

Read more

The key to successful security programs? Look to your business

Conducting security risk analysis is a challenge. Start with your business leaders, who can speak to their operations best.

Read more

Service Points for Secure, Automated, Resilient Networks

Play video Remember when brick and mortar banks were the only option? It was pretty inconvenient. Now ATMs provide access to services everywhere at a…

Read more

DNS over HTTPS: what, why, and who cares

Encrypting DNS queries and responses over HTTPS has long sparked robust debate, with interest from numerous stakeholders. Learn more with BlueCat.

Read more