Fed Tech Roundup September 1

global-technology

The following are some of the hot topics in the federal technology ecosystem (fromFedTechTicker.com and TopTechTicker.com):  Fed Tech Ticker Purdue part of $171 million federal initiative – Journal and Courier US federal agent investigating Silk Road admits $800000 bitcoin theft – The Guardian OMB, Treasury Hammer Out Final DATA Act Standards – Nextgov After the breach: 21.5 […]

The 2016 Big Data Prediction: Which of these two types of organization will you be in?

darpa_big_data

Today, there is countless data collected and analyzed by companies. Just a few years ago, that data was useless, now data is collected and used to provide answers and solve problems. As big data use cases continue to evolve, there will be an increasing number of business missions that will be served by new approaches […]

FireHost is Now Armor: featuring an advanced linking intelligence, defense and control focused on customer outcomes

armor

Editor’s note: We have watched the market respond to the proactive, well engineered investment in information protection at FireHost, their years of work in enhanced security for customers has made them the market leading provider of highly secure cloud infrastructure. Now known as Armor, these offerings have been enhanced to deliver the best possible security […]

Manage Those Keys

Screen Shot 2015-06-11 at 9.52.46 AM

An unavoidable fact of life is that data breaches can and will occur. The jury is still out on when and to what extent we will be able to reverse this situation. However, in the meantime, to avoid appearing on the “wall of shame” of major breaches that expose confidential information, you had better make […]

Two Factor Failure: With complexity comes new vulnerabilities

cybersecurity-graphic

One of the most significant capabilities in the enterprise defensive arsenal is multi-factor authentication. There is no such thing as a single silver bullet that will mitigate all risks, but in today’s world if you do not have multi factor authentication in place you are almost negligent in your defense. Multi-factor defense helps solve many weaknesses […]

Three-Part Vodcast for the Latest Updates and Enhancements of Version 7.1 of Bright Cluster Manager

Bright_Logo_v2

In this three-part vodcast, Ian Lumb, Product Marketing Manager, discusses Version 7.1 of Bright Cluster Manager for HPC. In part one, Lumb walks the viewers through the most significant improvement in version 7.1. The new improvements add to the completeness and robustness of the product. The improvements help users deploy, use and maintain HPC clusters […]