Showing content for :

193 posts

DNS Data: The New Cybersecurity Hero

There is cruel irony in DNS. By their very nature, Domain Name Systems facilitate an internet-friendly naming environment making it simple and seamless for…

Read more

Exposing the Enemy Within Webinar

Scott Penney, Director of Cybersecurity Solutions at BlueCat, discusses how DNS data can expose the enemy within your network

Read more

Federal IT: Sure, Your DNS is Compliant. But are You Secure?

For Federal IT managers, compliance is a primary motivator.

Read more

The Risks of Rube Goldberg DNS

“A well-oiled machine.” That’s the highest compliment any network administrator can receive. In a business where people tend to focus on the negative,…

Read more

NotPetya: DNS-leveraging Malware

Hot on the heels of last month’s WannaCry ransomware attack comes a new threat: NotPetya.

Read more

DNS helped stop the WannaCry ransomware attack

In 2017, the world was confronted by a ransomware attack that demonstrated how DNS visibility and control are key to any layered security strategy.

Read more

BlueCat Redefines Enterprise Security with BlueCat DNS Edge™

Leveraging the power of DNS to protect the enterprise

Read more

Protect Against Malvertising with an Active Security Strategy

If you pay attention to the world of security you’ve probably heard about the upswing in a type of attack known as Malvertising.

Read more

The Dyn DNS DDoS Attack, and What to Do About It

In October 2016, Dyn, a major internet DNS service provider, was attacked.¬†Here’s more about it, and how to protect your network against similar…

Read more

Five Tips to Reduce Dwell Time

Dwell time is arguably the most accurate indicator of an enterprise’s security.

Read more