Disaster recovery: Network infrastructure

By | May 24th, 2016|Blog|

Today we live in a world of not if, but when. We're not talking about global warming or the presidential election, well not here at least. We're talking about getting hacked. As strong as the efforts are going into cybersecurity and hacking prevention, it's a losing game. Smart people are putting money into thinking about [...]

Granular authorization combats privilege hogs

By | April 28th, 2016|Blog|

When it comes to barriers to innovation in federal IT or even in the enterprise, individual ego and personal empires built on unnecessary network privileges can be a significant problem. The good news is functionality like the granular authorization capabilities of the Uplogix out-of-band platform make it easier to rein in so called "privilege hogs." Federal [...]

IoT automation requires a smarter network

By | March 14th, 2016|Blog|

An article in NetworkWorld earlier this month on three fixes needed to get the network ready for the IoT revolution missed a fourth critical component: IoT automation. Cisco says today that there might be 50 billion devices connected to the Internet by 2020, which some are beginning to say might be low, especially once you [...]

What’s it take to be a transformational CIO?

By | March 10th, 2016|Blog|

The state of technology is in flux for CIOs juggling cybersecurity threats, expanding demands from business units and the challenge of having to compete for the very customers their organization is charged with supporting. An extensive survey in CIO Magazine revealed some of the challenges facing today's heads of IT -- a role nearly 90 percent say [...]

Encryption battle between the FBI and Apple

By | February 22nd, 2016|Blog|

Encryption has been in the news for the last week following the court order requiring Apply to unlock the iPhone of San Bernardino gunman Syed Farook for the FBI. Both the Bureau and Apple are working the court of popular opinion from different angles. The FBI's argument is that they requested Apple's help unlocking one phone, [...]

Pandemic year for healthcare cybersecurity

By | February 11th, 2016|Blog|

2015 was a rough year for healthcare cybersecurity. The 113 million patient records breached was more than twice as many as in the five prior years combined. To make things even more discomforting, nine of the top ten incidents and more than 98-percent of the records stolen were the result of hacking attacks. Healthcare IT [...]

Ship cyber security guidelines launched

By | January 11th, 2016|Blog|

As vessels at sea become better linked via broadband satellite and other connections, the risk of ship cyber security issues increases. To increase awareness of these risks, the global shipping community released guidelines for avoiding potential cyber vulnerabilities that could potentially drive major safety, environmental and commercial incidents. The guidelines were released by BIMCO, the largest international shipping association, and [...]

Top Uplogix Blog Articles of 2015

By | December 17th, 2015|Blog|

As a platform for network automation, Uplogix touches on many areas of networking, leading the Uplogix blog to hit on many topics throughout the year. A quick analysis of which articles had the most hits showed some of the favorites from this year. They tended to break into categories like security, our product, our staff [...]

Cybersecurity threats in 2016

By | December 7th, 2015|Blog|

December is a great time to look back on the year and look forward to what to expect in the new year. The McAfee Labs security team released their annual report about the cybersecurity threats to expect in the next five years. Unfortunately the news is that if you thought ransomware, data breaches and hacked Jeeps were [...]

Security automation parallels network automation

By | November 17th, 2015|Blog|

An increasing number of security tools are providing automation capabilities to reduce the burden on security specialists when it comes to intrusion prevention, network access control, endpoint security and mobile device management. But to a large degree, these features sit unused. Legitimate worries about blocking business traffic accidentally and keeping business from operating as it [...]