How DNS powers DevOps in DOD “software factories” – Tempemail

The sleekest jet.  The biggest aircraft carrier.  The most badass tank.  DOD agencies used to engage in a not-so-subtle competition to develop the coolest hardware on the planet.  In recent years, however, the measure of “cool” has shifted dramatically.  Instead of highlighting new weapons systems and platforms, DOD agencies are starting to put their resources […]

Read More

Bolster defense-in-depth with BlueCat threat feeds – Tempemail

To block malicious network activity, you only need two things.  First, you need a way to filter network traffic through security policies.  Second, you need a threat feed to populate those security policies with up-to-date, meaningful intelligence. Thankfully, network security teams are spoiled for choice on both fronts.  There are tons of firewalls and filtering […]

Read More

Stop advanced threats with BlueCat Threat Protection – Tempemail

IoT is making networks smarter and more efficient, but comes with significant security trade offs. With 91% of malware using the DNS protocol, each new connection creates opportunities for DNS attacks to infiltrate the network and exfiltrate sensitive data. BlueCat’s Threat Protection is a security feed which provides security teams with a strong defense against […]

Read More

WFH is driving a DoH explosion – what’s the impact? – Tempemail

The rapid, unplanned shift to working from home is uncovering a new world of challenges for network and security teams.  As new usage patterns emerge, everyone is looking to reduce their attack surface and optimize their network for maximum performance. Here at BlueCat, we’re constantly looking at the patterns of DNS traffic which flow through […]

Read More

BlueCat-Illusive integration enables efficient, effective deception – Tempemail

Deception is quickly emerging as one of the most innovative and effective ways to protect a network.  It’s an idea that occupies a sensible middle ground in the spectrum of cybersecurity tactics.  Instead of merely reacting to an attack in progress, or aggressively “hacking back”, deception allows enterprises to protect themselves by diverting the attack […]

Read More