Security archives
DNS Data: The New Cybersecurity Hero
There is cruel irony in DNS. By their very nature, Domain Name Systems facilitate an internet-friendly naming environment making it simple and seamless for…
Exposing the Enemy Within Webinar
Scott Penney, Director of Cybersecurity Solutions at BlueCat, discusses how DNS data can expose the enemy within your network
Federal IT: Sure, Your DNS is Compliant. But are You Secure?
For Federal IT managers, compliance is a primary motivator.
…
The Risks of Rube Goldberg DNS
“A well-oiled machine.” That’s the highest compliment any network administrator can receive. In a business where people tend to focus on the negative,…
NotPetya: DNS-leveraging Malware
Hot on the heels of last month’s WannaCry ransomware attack comes a new threat: NotPetya.
DNS helped stop the WannaCry ransomware attack
In 2017, the world was confronted by a ransomware attack that demonstrated how DNS visibility and control are key to any layered security strategy.
BlueCat Redefines Enterprise Security with BlueCat DNS Edge™
Leveraging the power of DNS to protect the enterprise
…
Protect Against Malvertising with an Active Security Strategy
If you pay attention to the world of security you’ve probably heard about the upswing in a type of attack known as Malvertising.
The Dyn DNS DDoS Attack, and What to Do About It
The Dyn Attack Explained On October 21 2016, Dyn, a major internet Domain Name System (DNS) service provider, was attacked. This attack used a massive…
Five Tips to Reduce Dwell Time
Dwell time is arguably the most accurate indicator of an enterprise’s security.
Take your PCI compliance to the next level
Think about how many times each day you pull a credit or debit card out of your wallet to pay for gas, groceries, a cup of coffee, or a new pair of shoes.
eWeek: How to Alleviate the 15 Top Stressors in IT Systems
Most IT security professionals harbor a certain amount of conservatism: The enthusiasm for all things new and innovative is tempered by skepticism about…