Company Blog

Maureen Oconnell's picture
Written by
Peter Doggart

Are you a Splunk user? If so, this blog is definitely for you. If you also have any Blue Coat equipment, put down that cup of coffee, stop reading the news on your iPhone and listen up-- I’m about to make your life a lot easier.

Maureen Oconnell's picture
Written by
Maureen Oconnell

RSA Conference 2015 is just around the corner. Beginning on Monday, April 20th, Moscone Center in San Francisco will be the center of the security world, and we couldn’t be more excited.

Blue Coat Booth- North Hall, #3734

Maureen Oconnell's picture
Written by
Greg Mayfield

Up to a third of enterprise internet traffic is now encrypted, and that figure is growing rapidly. Cybercriminals have learned to hide in plain sight and cloak their attacks within Transport Layer Security (TLS) or Secure Sockets Layer (SSL) traffic, knowing very well that perimeter security devices are unable to spot the intrusion.

Anonymous's picture
Written by
Blue Coat Vulnerability Response Team

We have received questions from the media about a presentation that was scheduled to take place at a Security Conference in Singapore by a researcher from Airbus Group focusing on Blue Coat’s Proxy SG. Airbus withdrew the presentation from the conference raising some concerns by the security industry as to the content of the presentation and the circumstance around the withdrawal.

Blue Coat's picture
Written by
Blue Coat

What Inception–Cloud Atlas tells us about the advanced threat landscape

Maureen Oconnell's picture
Written by
Peter Doggart

SSL (Secure Socket Layer) network protocol, and more broadly the cipher suites that are used for key exchange and encryption, are one of those really interesting technologies that were designed to keep us safe on the Internet, but in doing so have completely disrupted the network security industry to a point where our protection and detection equipment have become