About bmoran

This author has not yet filled in any details.
So far bmoran has created 403 blog entries.

A first responder for cyber resiliency

[fsn_row][fsn_column width="12"][fsn_text] In an emergency, you call first responders because they are stationed in your neighborhood for rapid response and have the tools and skills needed for the situation. Uplogix is your day zero first responder when it comes to response and recovery from a network hack. Uplogix deploys in the rack with your network infrastructure and utilizes advanced out-of-band capabilities and [...]

Cyber insurance is gaining popularity, but is it enough?

[fsn_row][fsn_column width="12"][fsn_text] Cyber attacks are a constant risk, and like other threats such as floods or theft, the insurance industry stands ready to help minimize the risk: behold cyber insurance. While adoption continues to grow, a study by Spiceworks shows that 38 percent of organizations across North America and Europe already have an active policy. [...]

Cost of downtime is a personal question

[fsn_row][fsn_column width="12"][fsn_text] Everyone has one, but it's still not an easy subject for most people. We're talking about the cost of downtime in their network. It's not an easy calculation if you want to be accurate, but one would be hard pressed to find anyone that says network downtime today is LESS expensive than in [...]

Keepinging sharp with edge computing

[fsn_row][fsn_column width="12"][fsn_text] Edge computing answers issues about data throughput, but also brings concerns about security and scalability, but the biggest challenge might be how to get the right people to work together to make it work. It makes sense. Rather than figure out larger pipes for transporting data from remote locations or try to program [...]

Selfies, streaming and staying in touch are the norm on today’s cruise ships

[fsn_row][fsn_column width="12"][fsn_text] The last time we had a post on Uplogix deployments for satellite networks on cruise lines was 2013. Since that time cruise ships and their satellite providers have gone from mobile hotspots to full-blown corporate headquarters in terms on their data use. Not only have ships vastly increased their network infrastructure and bandwidth [...]

Federal shutdown offers hacking target

[fsn_row][fsn_column width="12"][fsn_text] The ongoing federal shutdown looks like a tantalizing distraction for hackers, based on the announcement this week of an emergency Department of Homeland Security directive for nearly all federal agencies. The directive mandates cybersecurity actions to counter a global Domain Name System infrastructure hijacking campaign. Cybersecurity and Infrastructure Security Agency (CISA) director Christopher [...]

Education networks tested

[fsn_row][fsn_column width="12"][fsn_text] A recent survey of professionals in the K-12 education network space reported feeling the strain of new learning models and an increasing number of devices on their network consuming ever-greater bandwidth. More than half of those in the survey have plans to implement 1-to-1 programs that provide a laptop or mobile device to [...]

First task for the Space Force?

[fsn_row][fsn_column width="12"][fsn_text] It's often said that complexity is the enemy of cybersecurity because complex systems have inherent risks that are hard to predict. Some of the most complex systems are the satellites, probes and manned space vessels that are growing in number on an almost daily basis. Precision engineering and custom embedded computing and communications [...]

2019 predictions for the network and beyond

[fsn_row][fsn_column width="12"][fsn_text] With the year coming to a close, making 2019 predictions isn't much of a stretch. Here's what we're seeing in a few areas to look for in 2019. The Network Any predictions of network technology direction have to include Cisco, and for Cisco the future isn't as much in hardware as software. Software-defined [...]

Network admins as IOT gatekeepers?

[fsn_row][fsn_column width="12"][fsn_text] For network admins, the pending influx of IoT devices is still far enough away (maybe?) that much is unsure about how it will all work. Some are concerned about security risks of billions of additional endpoints on the network. Others see new, untested 5G networks shouldering the burden of data transport. Still others [...]