Recent Articles

Moving Large Amounts of Data Quickly a Focus of NLIT Summit 2014

The need to move large amounts of data more quickly was once again a focus of the NLIT Summit 2014, an annual event focused on the information technology requirements to support U.S. National Laboratories (http://www.fbcinc.com/e/nlit/). I participated in this year’s NLIT Summit in San Francisco and spoke with IT strategists and decision makers about the information-sharing challenges for advanced research communities, as well as possible solutions, including the Science DMZ.

How the Federal Government Can Fortify its Data Center Defenses

The number and sophistication of threats targeting federal data centers is rapidly growing. This has a created an environment where government IT professionals have to focus their cyber security efforts on pro-active defense of the enterprise data they collect, use, store and share. Simultaneously, technology trends continue to add to the already complex topic of data center security. The emergence of expanded automation and virtualization, increased data volume, and the

Migrating to the Software-Defined Networking in Higher Education to Improve Student Outcomes

In today’s blended educational environments, online learning is an important component that helps institutions improve student outcomes while cutting costs and meeting student demands for flexible, anytime/anywhere access. By 2015, more than half of today’s students will be learning online, with a large concentration of older students who have returned to school to retool their skills. Software-defined networking (SDN) technologies can help colleges and universities create an effective and efficient

Agency Cybersecurity Priorities – Some New, Some Old – All Essential

In his featured keynote address on June 18th at the Cyber Security Brainstorm hosted by MeriTalk, John Banghart, Director for Federal Cybersecurity, National Security Staff, Executive Office of the President, highlighted four priority areas for improving agency efforts to remove barriers to progress and better protect information and IT infrastructures.  He shared these priorities and noted they apply to all agencies, with some more focused on specific topics than others.

Considerations for Implementing Effective Continuous Monitoring

As IT infrastructures evolve, established security systems and controls can be impacted and new security vulnerabilities may be introduced.   Continuous Monitoring (CM), one of the six steps in the National Institute of Standards and Technology (NIST) Risk Management Framework, is designed to help Federal Government agencies identify and confirm if their deployed security controls are robust and work as intended at all times. A significant and continuing concern for agency

Next Generation Firewall Protects Schools from Cyber Threats

As digital learning transforms the ease and speed at which students across the country’s school districts access information, today’s students may never experience what it’s like to flip through the pages of a traditional printed text book, encyclopedia or card catalog. However, along with its convenience and access to greater amounts of information and resources, digital learning can expose school districts to increased cyber security vulnerabilities. Recent studies show 200,000

180181046

180181046