High-growth companies are challenged to hire quickly and keep their unique corporate culture. This panel of HR executives discusses both.

BlueCat hosts JISA delegates at our Toronto office to discuss the growing need for network automation, cloud-based solutions and DNS security in Japan.

In the second of this three-part series on DNS as naïve enabler in malicious cyber activity, we introduce persona #2, DNS as hostage. As a hostage, DNS is recruited as a naïve messenger to route private information over the internet. The best example of DNS used as hostage is tunneling. Because DNS is often not […]

When you get senior network engineers from world class enterprises like Coca-Cola, Cox Automotive and The Home Depot, in a room together – and toss in a round of golf – you get some great insights into their daily challenges, concerns, and long-term goals. The BlueCat Atlanta User Group did just that. We gathered network […]

No matter what business you’re in or where you’re located, your IT infrastructure is the backbone of your operation. In the first of this two part series, you’ll see how BlueCat’s scalable Enterprise DNS transformations helped improve the productivity, security, and reliability of a wide variety of European companies, from IT to education to industrial […]

It’s a good thing we’ve expanded our office space – we might need to install a trophy cabinet. BlueCat is proud to announce that we’ve been named as one of Canada’s Best Workplaces in Technology. And with over 100 open positions currently available in our Toronto office, we’re looking forward to further bolstering our position […]

Supervisory Control and Data Acquisition (SCADA) systems are the most important networks you’ve never heard of. SCADA systems power most industrial processes. Using sensors to collect data on anything from temperatures to pressure to RPMs, these systems allow centralized monitoring of machines in the field. This field data is then analyzed and turned into instructions, […]

The Domain Name System is as old as the internet itself. Using DNS for network security, however, is a relatively new concept. As network administrators begin to harness the power of DNS to secure their systems, we turned to an expert for some advice on how to approach this issue. BlueCat recently hosted an informative […]

 This blog is the second in a four-part series, 3 Personas of DNS in Cyber Security Hackers are resourceful. They know that helpful DNS will always work to naively return an IP address when queried. DNS exists to connect clients to backend services by acting as the internet’s phone book. If you’re in the business […]

If you’re considering a DNS migration, you’ll want to know these guys, Chris Buxton and Reese Cline. Between them, these two DNS architects have 45 years of experience, most of it helping folks migrate DNS platforms. They’ve seen it all. Helped hundreds of enterprises make the transition. Minimizing anxiety. Maximizing up-time. And generally treating each […]

Scroll Up