Security

    Customer situation brief on SUNBURST/Solorigate

    Learn more about the attack via the SolarWinds Orion platform and how BlueCat products use DNS to help protect customers against compromises like it.

    Read more
    Sunburst Webinar

    Reports indicate that the recent SUNBURST/Solorigate attack impacted approximately 18k customers via trojanized updates to Solarwind’s Orion platform.…

    Learn more
    On the road to platform hardening, consider a STIG

    Security Technical Implementation Guides standardize security configuration on networks, servers, and devices. BlueCat uses them and you can, too.

    Read more
    To better see the threats on your network, try DNS

    DNS is a vector used in most cyber attacks. When it comes to DNS, BlueCat can enhance visibility, detection, and containment of threats to your network.

    Read more
    Webinar: Threat Protection

    BlueCat Solution Architect Steffen Probst discusses how intelligent security from BlueCat uses DNS to protect internal and external traffic against threats.

    Read more
    Keeping networks secure during unprecedented WFH

    As we work from home, DNS over HTTPS (DOH) use is up by 1,500%. Learn what DNS tells us about network security and how BlueCat and Cisco Umbrella can help.

    Read more
    eBook: DNS & Cybersecurity Compliance

    At BlueCat, we know that DNS has a strong role to play in advancing both cybersecurity and compliance. But we also know that it’s not enough to simply say…

    Learn more
    eBook: DNS in the Cybersecurity Stack

    Malicious actors exploit DNS every day to establish command and control, navigate through networks, and exfiltrate data. his eBook will show you how DNS can…

    Learn more
    DNS-Based Security: A new FISMA compliance model

    DNS data is an extraordinary valuable–and surprisingly underutilized–source of information that gets to the heart of FISMA compliance. Get the eBook.

    Learn more
    2020 Networking Trends Report

    NetOps teams are increasingly required to drive rapid changes to the network in support of their business’ digital transformation efforts.

    Learn more
    eBook: A House Divided

    In this exclusive research report with IDG (International Data Group), we surveyed hundreds of networking and cybersecurity professionals to understand how…

    Learn more
    Threat Protection
    Learn more