The Approach
Before starting, I had the cybersecurity team walk me through how certain attacks (like DNS tunneling) worked, how they evaded detection by standard systems, and explain how these attacks could be detected with BlueCat’s product.
I took these learnings and explored ways to turn what is essentially scanning through data logs, into a visually compelling explanation of DNS Security.