Showing content for :

189 posts

DDI maturity drives multi-cloud automation and security

This infographic examines the evolving states of DDI maturity and how DDI maturity drives multicloud, automation, and security.

Read more

BlueCat evolves its DDI portfolio to empower IT and network admins

New features tame network complexity, reduce costs, improve security, and automate DDI tasks to drive rapid innovation.

Read more

BlueCat Edge for security

BlueCat Edge allows security teams to leverage the DNS data that it captures for another layer of security intelligence and protection.

Read more

Clarke: How to mitigate ransomware, protect the cloud

Renowned cybersecurity expert Richard Clarke delves into protecting your network from ransomware and what cloud adoption means for your security strategy.

Read more

Examining the Log4j2 vulnerability and our response

Learn how the Java-based Log4j2 logging vulnerability works, how severe it is, its potential effects on BlueCat products, and what has been done to fix it.

Read more

DNS sinkhole: A tool to help thwart cyberattacks

A DNS sinkhole supplies a false domain name in response to a DNS query, preventing connections to malicious or unwanted domains. Learn more with BlueCat.

Read more

Four major DNS attack types and how to mitigate them

In a DNS attack, DNS is compromised or used as a vector. Learn about the different attack types and how to prevent, detect, and mitigate them with BlueCat.

Read more

Our analysis: Gartner’s DNS security best practices

BlueCat has long known what Gartner now says: Your network needs DNS security. Learn how DNS data logs, threat feeds, and setting policies can help.

Read more

Among cyber-attack techniques, what is a DGA?

What is a DGA? To evade detection, they churn out domain names and IP addresses for malware command and control servers. Learn more with BlueCat.

Read more

For DNS server caching, what is the ideal TTL?

Many factors affect how you decide to set time to live (TTL) for DNS servers. Learn more, plus how BlueCat Edge’s TTL features can bolster your network.

Read more

NSA and CISA: Protective DNS key to network defense

U.S. cyber agencies now point to protective DNS as a defense strategy, confirming what BlueCat already knew: DNS is critical to detecting network threats.

Read more

SUNBURST/Solorigate Situation Briefing

BlueCat leaders discuss how the malware attack via SolarWind’s Orion platform exploited DNS and how BlueCat Edge could have helped to detect it.

Read more