Security archives

Protect Your Network, Protect Your House: Takeaways from the Capital Cybersecurity Summit

On November 14 and 15, the Northern Virginia Technology Council hosted the second annual Capital Cybersecurity Summit in Virginia.

Read more

Breach, Blame, Repeat

World renowned cyber security expert, Dick Clarke, advises on breaking the cycle of breach and blame by evolving the role of the CISO.

Read more

DNS as a Weapon in Cyber Security

Bad actors know that DNS makes a great weapon in producing massive amounts of traffic for successful DDoS attacks. Here’s how.

Read more

DNS as Facilitator in Cyber Security

The first DNS persona in this 3-part series, DNS as Facilitator is the naive resolver in helping malware spread throughout your networks.

Read more

DNS as Hostage in Cyber Security

DNS is easily recruited as a naive messenger for malicious cyber activity. ‘DNS as Hostage’ is the 2nd in this 3-part series by BlueCat.

Read more

DNS: A Security Differentiator for System Integrators

At BlueCat’s first annual System Integrator Summit, companies in the Federal system integrator and partner community met to learn more about the strong…

Read more

Vote NO on Exposed Voter Data

Do you remember where you were between June 1 and June 12, 2017?

Read more

Secure Electronic Voting Through DNS

With the November 7 election looming, state and local governments are scrambling to secure their electoral systems.

Read more

How DDoS attacks use DNS as a weapon

Bad actors know that DoS and DDoS attacks can use DNS as a weapon to cause spectacular web crashes that bring critical business services to their knees.

Read more

Breach, blame, repeat: The hard truths of today’s CISO

In this webinar, cybersecurity and counterterrorism expert DIck Clarke warns that it’s no longer a matter of if, but when, an IT breach will occur.

Read more

Is your DNS being held hostage?

In the second of this three-part series on DNS as a naïve enabler in malicious cyber activity, we introduce persona No. 2, DNS as a hostage.

Read more

The Role of DNS in SCADA System Security

Supervisory Control and Data Acquisition (SCADA) systems are the most important networks you’ve never heard of.

Read more