3 Ways to Mitigate Insider Threat Risk Prior to an Employee’s Departure

We are seeing a disturbing insider threat trend impacting operations and causing reputational harm in the days leading up to an employee’s departure from an organization. For example, last week a Twitter employee deleted President’s Trump’s Twitter account prior to leaving the premises on his last day of employment. In September, a contractor was convicted […]

Best Practices for Federal DNS Security

Domain Name Systems are the core of every Federal network. Malicious actors depend on DNS to maneuver within systems and steal critical information – a whopping 91.3% of cyberattacks use DNS. With advanced persistent threats a growing trend, DNS security is a fundamental mission of every Federal IT security professional. BlueCat is providing a webinar […]

Kinetica: GPU-accelerated analytics database

With this post we are initializing our coverage of Kinetica. Kinetica offers a GPU-accelerated, in-memory analytics database (https://www.kinetica.com/product/) that delivers truly real-time response to queries on large, complex and streaming data sets: 100x faster performance at 1/10 of the hardware of traditional databases. Kinetica was initially developed for the US Army Intelligence and Security Command […]

Solarflare’s Open Compute Platform, Software-Defined, NIC Card

Solarflare, a global leader in networking solutions for modern data centers, is releasing an Open Compute Platform (OCP) software-defined, networking interface card, offering the industry’s most scalable, lowest latency networking solution to meet the dynamic needs of the enterprise environment. The SFN8722 OCP offers 10GbE performance, which is critical for today’s data centers where ultra […]

Steps for Fortifying Your Organization’s Data in the Cyber War

The most recent ransomware attacks should make every executive in every company take notice, and be worried. Last week, I spoke at a cyber event and came with a message: the continued focus on legacy endpoint and network security is almost worthless. As cyber attacks become more sophisticated, our reliance on legacy ‘castle and moat’ theory to […]

Cybersecurity Executive Order Provides Agency Leadership with Opportunities and Challenges

President Trump’s “Presidential Executive Order on Strengthening US Cybersecurity and Critical Infrastructure” is significant as it discusses improvements to the Nation’s digital infrastructure, protection of the power grid, replacement of antiquated IT systems, protection against cyber threats. It also makes government leadership accountable for cyber deterrence. Agency heads can no longer delegate responsibility for cybersecurity […]