Security archives
What you can learn from an NXDOMAIN response
At a basic level, an NXDOMAIN response means “that site does not exist.” But it can also provide critical clues about your network’s security.
Is the Gartner SASE model the future of networking?
The Gartner SASE model foreshadows the convergence of network and security solutions, which will mean significant changes in network operations.
Fortify Your Defenses with Cisco Umbrella & BlueCat
In this webinar, you’ll learn: How to identify threats faster through rapid correlation of external threat data with source IP.
Protect your network from DNS hijacking
Learn about the three types of DNS hijacking, how to protect your network, and how BlueCat’s platform can further enhance your network security.
What is DNS poisoning and how to prevent it
DNS poisoning (aka DNS cache poisoning or DNS spoofing) uses security gaps in the DNS protocol to redirect internet traffic to malicious websites.
The key to successful security programs? Look to your business
Conducting security risk analysis is a challenge. Start with your business leaders, who can speak to their operations best.
5 Foundational Parts of a Cybersecurity Toolkit
Choosing the right combination of tools in each area is crucial to strengthen your security posture. DNS security plays a crucial because it permeates each…
DNS over HTTPS: what, why, and who cares
Encrypting DNS queries and responses over HTTPS has long sparked robust debate, with interest from numerous stakeholders. Learn more with BlueCat.
Spot the DNS Attack: Halloween Edition
Domain Name System (DNS) attacks are no doubt scary. They interfere with your connection to the internet, invade your privacy, and cause lost productivity.…
6 DNS Horror Stories that will Spook Your IT Team this Halloween
What’s the scariest thing that has ever happened to you? Is it a mysterious shadow in your hallway at night? Nearly losing your child in a crowd? For…
How Brooklyn Nine-Nine S6E14 got cybersecurity all wrong
Brooklyn Nine-Nine’s writers have a great cybersecurity vocabulary, but not a great understanding of how cybersecurity works. BlueCat breaks it down.