No easy path, Part Two: Federal IT Modernization

By | October 24th, 2018|Blog|

IT modernization is a challenge in all organizations, but federal government CIOs might have it a little tougher than their enterprise counterparts. A new study on IT investment sheds light on how agencies are approaching federal IT modernization. The FedScoop/IBM study's main takeaway was that agencies are getting out of the onsite, fed-run data [...]

No easy path to IT modernization

By | October 24th, 2018|Blog|

Good luck finding a CIO that's not struggling with some aspect of IT modernization. The list of challenges is never ending: the IT skills gap, increasingly sophisticated security threats, IT/business alignment all requiring both tactical and strategic management. And what about innovation? Some days what feels like what was last week's next big thing [...]

Gartner’s top 10 tech trends for 2019

By | October 22nd, 2018|Blog|

Gartner announced their top 10 strategic technology trends at their annual conference in Orlando this month. Do you think they are on target? What's missing from their list? Scanning the list, it's clear that the top 10 technologies aren't necessarily stand-alone items, but many combine a few new or emerging areas to achieve new [...]

New CISO Handbook guides fed cyber execs

By | July 20th, 2018|Blog|

A CISO Handbook was released recently by a group of federal CISO & CIO councils to help their peers navigate current government approaches to cybersecurity and risk management. Available through the CIO.gov website, the CISO Handbook is designed to provide a "one stop shop" for new and emerging information security professionals looking to become [...]

Offensive cybersecurity, whose job is it?

By | June 22nd, 2018|Blog|

A recent interview with former Chairman of the Joint Chiefs of Staff Adm. Mike Mullen brought up some interesting comments on offensive cybersecurity. US Cyber Command has been elevated to its own combatant command, but should the government green light companies the ability to hack back when attacked? Mullen answered that question by saying [...]

Hackers target US satellite industry

By | June 20th, 2018|Blog|

The US-based satellite industry has been targeted by a Chinese-linked hacking group, according to new research by Symantec. The hacking campaign apparently targeted command and control systems. Targets include at least two US-based satellite companies, a Defense Department contractor and a geospatial imaging technology firm. The attackers use a combination of open-source and custom-built hacking [...]

Spectre, Meltdown exploits don’t impact Uplogix

By | January 11th, 2018|Blog|

The New Year kicked off with a thud as the Meltdown and Spectre exploits dominated headlines with critical vulnerabilities in modern processors. Uplogix Local Managers are not impacted by these exploits. IN BRIEF The Uplogix 5000 and 500 Local Managers are not impacted by either the Meltdown or Spectre exploits. Hardware components in both Local Manager [...]

KRACK zero-day cracks WPA2

By | October 19th, 2017|Blog|

This week began with the zero-day news for a bug that effectively broke WPA2 wireless security. KRACK, named for Key Reinstallation Attack, is a fundamental flaw in the operation of Wi-Fi Protected Access II, the security protocol upgrade from the old, broken WEP protocol. The issue is with the systems four-way handshake that permits [...]

Ransomware brings down county services

By | September 20th, 2017|Blog|

Montgomery County in Alabama was hit by a ransomware attack that left IT staff scrambling to regain control of their systems. Among other impacts, vehicle tags and registrations are unable to be processed as officials investigate the cause of the breach and their options to regain control and clean up their system. The debilitating ransomware [...]

Maritime networks concerned following breach

By | August 11th, 2017|Blog|

Maritime networks are getting even more serious about security following the high-profile cyber attack of shipping giant Maersk in June. The coordinated attack impacted business on a global scale as Maersk had to take IT systems offline to respond to the breach over the span of about a week. It's not the first time maritime [...]