Security archives
APIs and data: The way to your IT organization’s heart
Show your security and network teams some love with DNS data to spot threats before they cause damage and BlueCat’s API to automate DNS services.
What we learned at Cisco Live Barcelona
Read up on BlueCat’s key takeaways from Cisco Live Barcelona 2018, including on the importance of DNS data to keep your network optimized and secure.
Why Trust is the Real Target of Your Data Breach
As Dick Clarke reminded us in our recent webinar, the needs and concerns of today’s CISO are unique and ever-changing as we hear reports of a new data…
Splunk, DNS logs, and why DNS data matters
Interested in downloading DNS Edge for Splunk? Download it from Splunkbase.
Make Your Point of Sale System a Point of Security
As the biggest season in retail winds down, Forever 21 was the latest retail target of a point of sale cyber attack, joining the likes of Chipotle and Game…
5 New Year’s resolutions to combat cyber attacks
What changes should we commit to this year to keep our networks safe? Here are five resolutions for the coming year, including leveraging DNS.
Two can play at that game: Thinking like a malicious adversary
In this whiteboard session, learn how DNS is critical to your cybersecurity strategy and how to keep adversaries in mind when structuring your domains.
Why the Cyber Threat Hunter Needs DNS
In our latest webinar in our cyber security series, we welcome Cyxtera Cyber Security Officer Chris Day.
The Threat Hunter’s New Weapon: DNS Data
Chief Cybersecurity Officer for Cyxtera, Chris Day talks about the evolution of cybersecurity and rise of the threat hunter role.
Are You Ready for the NIST 800-171 Compliance Deadline?
With only a few weeks until the December 31 deadline, are you scrambling to comply with NIST 800-171? Here’s how DNS-based security can help.
3 Reasons to Tune in to “The Threat Hunter’s Newest Weapon: DNS Data”
This Wednesday, Chris Day, Chief Cybersecurity Officer at Cyxtera will be joining us for an exclusive webinar, “The Threat Hunter’s Newest Weapon: DNS…
The iPhone X Face ID Hack and the Weapon of Curiosity
In the era of large-scale breaches and cybersecurity protocols, even on the most basic level, everything needs a password.