Showing content for :
189 posts
How Brooklyn Nine-Nine S6E14 got cybersecurity all wrong
Brooklyn Nine-Nine’s writers have a great cybersecurity vocabulary, but not a great understanding of how cybersecurity works. BlueCat breaks it down.
How to choose the right DNS firewall for your network
Threat feeds, network integration, deployment, and placement are all critical aspects to consider when looking for the right DNS firewall. BlueCat can help.
BlueCat-Cisco Umbrella integration
BlueCat and Cisco have teamed up to offer comprehensive DNS security which touches every part of the enterprise.
Bolster DNS security with BlueCat and Cisco Umbrella
Working together, BlueCat and Cisco Umbrella extend the breadth and depth of domain name system security across the enterprise.
Case Study: U.S. Logistics Company
Read the case study on a private US logistics company using BlueCat Integrity and Edge solutions for core DNS functionality and security.
DNS Edge and CDM BOUND-F
This brochure outlines the unique approach of BlueCat’s DNS Edge to the requirements of CDM Phase 3 BOUND-F.
Effective network security starts with internal DNS
Internal queries (which are invisible to boundary-facing firewalls) compose 60% of all network traffic. The solution is internal DNS security.
Which top-level domains to block and how to do it right
Identifying malicious top-level domains to block is easy enough. But you can take it further with BlueCat to spot devices querying bad TLDs to begin with.
Attack lessons: Shared responsibility and the cyber kill chain
Dr. Josephine Wolff joins BlueCat’s Andrew Wertkin to dissect significant cybersecurity attacks from the last decade and what we can learn from them.
What is DNSSEC and how does it work?
DNSSEC authenticates DNS queries and responses by using cryptographic digital signatures. Learn more and how BlueCat can help to make implementation easier.
Lessons from the Aftermath
Play video BlueCat’s CTO, Andrew Wertkin is joined by cybersecurity expert and author Josephine Wolff to dissect some of the significant cyberattacks from…