Cybersecurity training for university networks

[fsn_row][fsn_column width="12"][fsn_text] Cybersecurity training classes were in session at the University of West Florida's Center for Cybersecurity as part of a joint effort between university and state agencies to strengthen the state's preparedness. By providing the government workforce with the latest information and learning resources, the goal of the partnership is to utilize university resources [...]

Edge networking is a priority

[fsn_row][fsn_column width="12"][fsn_text] Edge networking stood out as a key area of interest on a recent NetworkWorld survey, with more than half of respondents indicating they have immediate plans. The 8th annual State of the Network survey indicated a growing importance of edge networking as organizations look to reduce latency by bringing computing resources closer to [...]

OOB benefits both SDN and NFV

[fsn_row][fsn_column width="12"][fsn_text] Software Defined Networking (SDN) and Network Functions Virtualization (NFV) are frequently confused with each other, but are different technologies that have some similarities to, and can benefit from advanced out-of-band (OOB). First, a few definitions: SDN - Abstracting the control and management planes from the underlying hardware, say for a router or switch. [...]

Big Data driving healthcare and pharma

[fsn_row][fsn_column width="12"][fsn_text] Big Data is more than the data itself, and the use cases for the healthcare and pharmaceutical industries include a wide set of technologies that capture, store, manage and analyze large, complex sets of data subject to stringent HIPAA regulations. The expanding list of applications includes: Drug discovery Precision medicine Clinical decision support [...]

Enterprise data centers expect continued growth

[fsn_row][fsn_column width="12"][fsn_text] Data centers aren't going away any time soon. Enterprise data centers are expected to continue growing, with one study reporting most survey respondents expect to at least double the amount of physical servers in their data centers by 2019. 151 North American organizations surveyed by IHS Markit said the investment is primarily designed [...]

New CISO Handbook guides fed cyber execs

[fsn_row][fsn_column width="12"][fsn_text] A CISO Handbook was released recently by a group of federal CISO & CIO councils to help their peers navigate current government approaches to cybersecurity and risk management. Available through the CIO.gov website, the CISO Handbook is designed to provide a "one stop shop" for new and emerging information security professionals looking to [...]

Underwater data centers bring new definition of remote management

[fsn_row][fsn_column width="12"][fsn_text] Today's winner for remote networking is Microsoft's Project Natick. The idea of a shipping container self-contained data center isn't new, but they've taken it to new heights, ahem... depths. The pre-built underwater data center was deployed via crane barge on a rock shelf 117 feet below the water's surface off the coast of [...]

Uplogix v5.5 software update available

[fsn_row][fsn_column width="12"][fsn_text] Earlier this month, Uplogix released software update v5.5 for the Uplogix Local Manager (LM) and Uplogix Control Center (UCC) with new features and improvements. IKEv2 VPN support is now available on both the LM and UCC. IKEv2 addresses a number of shortcomings in IKEv1. The Local Manager utilizes certificates to authenticate to VPN servers [...]

Offensive cybersecurity, whose job is it?

[fsn_row][fsn_column width="12"][fsn_text] A recent interview with former Chairman of the Joint Chiefs of Staff Adm. Mike Mullen brought up some interesting comments on offensive cybersecurity. US Cyber Command has been elevated to its own combatant command, but should the government green light companies the ability to hack back when attacked? Mullen answered that question by [...]

Hackers target US satellite industry

The US-based satellite industry has been targeted by a Chinese-linked hacking group, according to new research by Symantec. The hacking campaign apparently targeted command and control systems. Targets include at least two US-based satellite companies, a Defense Department contractor and a geospatial imaging technology firm. The attackers use a combination of open-source and custom-built hacking [...]