About bmoran

This author has not yet filled in any details.
So far bmoran has created 341 blog entries.

Cybersecurity training for university networks

By | August 10th, 2018|Blog|

Cybersecurity training classes were in session at the University of West Florida's Center for Cybersecurity as part of a joint effort between university and state agencies to strengthen the state's preparedness. By providing the government workforce with the latest information and learning resources, the goal of the partnership is to utilize university resources to [...]

Edge networking is a priority

By | August 7th, 2018|Blog|

Edge networking stood out as a key area of interest on a recent NetworkWorld survey, with more than half of respondents indicating they have immediate plans. The 8th annual State of the Network survey indicated a growing importance of edge networking as organizations look to reduce latency by bringing computing resources closer to the [...]

OOB benefits both SDN and NFV

By | July 25th, 2018|Blog|

Software Defined Networking (SDN) and Network Functions Virtualization (NFV) are frequently confused with each other, but are different technologies that have some similarities to, and can benefit from advanced out-of-band (OOB). First, a few definitions: SDN - Abstracting the control and management planes from the underlying hardware, say for a router or switch. This [...]

Big Data driving healthcare and pharma

By | July 25th, 2018|Blog|

Big Data is more than the data itself, and the use cases for the healthcare and pharmaceutical industries include a wide set of technologies that capture, store, manage and analyze large, complex sets of data subject to stringent HIPAA regulations. The expanding list of applications includes: Drug discovery Precision medicine Clinical decision support Population [...]

Enterprise data centers expect continued growth

By | July 24th, 2018|Blog|

Data centers aren't going away any time soon. Enterprise data centers are expected to continue growing, with one study reporting most survey respondents expect to at least double the amount of physical servers in their data centers by 2019. 151 North American organizations surveyed by IHS Markit said the investment is primarily designed to [...]

New CISO Handbook guides fed cyber execs

By | July 20th, 2018|Blog|

A CISO Handbook was released recently by a group of federal CISO & CIO councils to help their peers navigate current government approaches to cybersecurity and risk management. Available through the CIO.gov website, the CISO Handbook is designed to provide a "one stop shop" for new and emerging information security professionals looking to become [...]

Underwater data centers bring new definition of remote management

By | June 27th, 2018|Blog|

Today's winner for remote networking is Microsoft's Project Natick. The idea of a shipping container self-contained data center isn't new, but they've taken it to new heights, ahem... depths. The pre-built underwater data center was deployed via crane barge on a rock shelf 117 feet below the water's surface off the coast of the [...]

Uplogix v5.5 software update available

By | June 26th, 2018|Blog|

Earlier this month, Uplogix released software update v5.5 for the Uplogix Local Manager (LM) and Uplogix Control Center (UCC) with new features and improvements. IKEv2 VPN support is now available on both the LM and UCC. IKEv2 addresses a number of shortcomings in IKEv1. The Local Manager utilizes certificates to authenticate to VPN servers like [...]

Offensive cybersecurity, whose job is it?

By | June 22nd, 2018|Blog|

A recent interview with former Chairman of the Joint Chiefs of Staff Adm. Mike Mullen brought up some interesting comments on offensive cybersecurity. US Cyber Command has been elevated to its own combatant command, but should the government green light companies the ability to hack back when attacked? Mullen answered that question by saying [...]

Hackers target US satellite industry

By | June 20th, 2018|Blog|

The US-based satellite industry has been targeted by a Chinese-linked hacking group, according to new research by Symantec. The hacking campaign apparently targeted command and control systems. Targets include at least two US-based satellite companies, a Defense Department contractor and a geospatial imaging technology firm. The attackers use a combination of open-source and custom-built hacking [...]