Threat research, deployment guides, the API, what shipped last week — all the materials your security team will actually use.
A teardown of three active PhaaS kits and how olladns’s phishing model catches them within hours of registration.
The first-principles case for moving phishing and malware controls left, to the resolver. With references.
Live walkthrough of a 14-site enterprise rollout, with the rollback plan, the diff, and the “oh no” moment.
The 24 questions to answer before you touch your first resolver, plus the templates we hand to enterprise customers.
How we caught a coordinated C2 ring across 38 customers in under four minutes, using DGA + timing signals.
Step-by-step of how a 9-clinic medical group deployed olladns without OR disruption.
What we’ve learned about how quickly phishing infrastructure spins up — and how to keep pace.
Manage policies, sites, lists, and integrations as code. With a 12-line example to get you started.
Our anycast network rerouted around two failing roots in 11 seconds. Here’s the post-mortem and what we changed.
We’re hiring engineers who care more about reducing FPs than shipping models. Here’s the work.
Everything you need to deploy, integrate, and build on olladns.
Point your first resolver, deploy your first roaming client, see your first block.
Read guideEvery endpoint. Auth tokens, rate limits, pagination, and SDKs in Go, Python, and TypeScript.
Open API docsManage policies, sites, and lists as code. Drift detection on every plan.
View providerJamf, Intune, Kandji, Workspace ONE — silent deploy guides for every MDM.
Setup guidesStream every query to Splunk, Sentinel, Datadog, or Elastic in minutes.
Read connectorsConnect Entra ID, Okta, or Google. SCIM provisioning, group mapping.
Read identityReal-world policies: CIPA, HIPAA-safe, financial-services hardened, MSP defaults.
Open cookbookQuery DSL, time windows, regex, exports. The reference for our search.
Read searchWhat shipped, when. Subscribe to changelog · RSS
We host the most sensitive layer of your network. Here’s how we earn it.
Audited annually by an AICPA-accredited firm. Report available under NDA.
Certified, scope: all services and supporting systems.
BAA included on Enterprise. PHI never logged or transmitted to third parties.
DoH and DoT on every resolver. TLS 1.3 minimum, automatic cert rotation.
US-only, EU-only, or APAC-only resolver regions available on Business+.
Public program on HackerOne. Average payout: $1,400. Hall of fame: 184 researchers.
Our engineering team answers technical questions directly. No SDRs in the middle.