Government

    The role of DNS in CMMC compliance

    This datasheet provides a quick overview of how DNS security plays into the CMMC controls, and how BlueCat promotes compliance.

    Read more
    What We Learned at DODIIS

    Another fantastic DODIIS conference is in the books, and BlueCat learned a ton about how DNS plays into the strategic priorities of the defense and…

    Read more
    Preparing for the Gradual JEDI Revolution at DOD

    Now that DOD’s huge JEDI contract has been awarded to Microsoft, DOD agencies should really start thinking about how they are going to use cloud…

    Read more
    Kaspersky Lab Software Gone? Think Again

    With a series of leaks about high-level security incidents and revelations about the company’s potential connections to the Russian government, Kaspersky…

    Read more
    What DOD Can Do Now to Prep for the JEDI Cloud

    The JEDI program is a critical strategic investment for DOD – one that has strong leadership support.  Now that the contract is awarded, are DOD agencies…

    Read more
    Cisco Live Orlando: Our Key Takeaways

    Cybersecurity was on everybody’s mind at one of this year’s most anticipated tech conferences, Cisco Live. In between rounds of our Spot the Threat…

    Read more
    Why Microsoft DNS Isn’t Appropriate for the JEDI Cloud

    Now that Microsoft has won the huge DOD JEDI contract, we’re looking at the DNS options available for agencies looking to migrate.  While Azure DNS…

    Read more
    Are You Ready for the NIST 800-171 Compliance Deadline?

    With only a few weeks until the December 31 deadline, are you scrambling to comply with NIST 800-171? Here’s how DNS-based security can help.

    Read more
    DNS: A Security Differentiator for System Integrators

    At BlueCat’s first annual System Integrator Summit, companies in the Federal system integrator and partner community met to learn more about the strong…

    Read more
    The Role of DNS in SCADA System Security

    Supervisory Control and Data Acquisition (SCADA) systems are the most important networks you’ve never heard of.

    Read more
    3 Things NIST Taught Us About DNS Security

    The Domain Name System is as old as the internet itself. Using DNS for network security, however, is a relatively new concept.

    Read more
    Best Practices for Federal DNS Security

    Scott Penney, Director of Cybersecurity Solutions at BlueCat, talks to Scott Rose, co-author of the NIST Secure Deployment Guide for DNS, about securing…

    Read more