Blog iconBlog

Carolina Advanced Digital, Inc. > Blog > Blog

Security: Top Twitter Influencers to Follow [Techopedia]

By Techopedia Staff, find VP of Engineering Jennifer Minella Takeaway: Stay on top of the latest news and views on cybersecurity by following these top influencers on Twitter. If there’s one area of the tech industry that’s undoubtly growing – and growing fast – it’s security. According to a recent report by Big Market Research, the Internet security market is set to grow at a rate of 8.1% per year between 2014 and 2020. As Internet-based technology spreads into nearly all areas of government, retail, IT and telecommunications, the threat of malware, spam and viruses has become an increasingly pressing concern. Fortunately, it’s also an area where new security technology and insights continue to emerge. Want to stay on top of new developments in this area? We’ve compiled a list of the most influential voices who are talking about it on Twitter. Why this list? Well, it’s based on Twitter data culled according to content, follower/following ratios, frequency of tweets, blog popularity, the opinions of other IT security experts and influencers, and our own subjective judgment. Read...
Read More
email email email email email email
profile iconPosted by Jennifer Minella

Upgrade Your Wireless in 16 Hours

Wireless technologies are everywhere. With the growing popularity of wireless, we’re seeing more and more places businesses, schools, government offices, retail stores, and transportation systems like air planes and trains–that are fully loaded with wireless. And yes, WiFi is even available in new cars! (And you thought texting and driving was a bad idea.) Wireless technologies are springing up everywhere with more robust speeds and features than ever before. So, what’s the big deal? With the advent of these WiFi-reliant systems weaving through our world, the need for experienced professionals to manage them is growing exponentially. Sadly, our industry has failed in helping our technologists evolve through the changes from telecomm to wired networking and now to wireless. While some of the fundamental technologies are shared across these communication standards, the reality is WiFi demands a set of tools and skills a professional can’t acquire without investing specific attention to learning them. The good news is, there’s a path to getting the skills needed to properly plan, deploy, manage, and secure wireless networks, and that path is accessible and affordable to technology professionals across the world. Started in 1999, CWNP (Certified Wireless Network Professional) is the industry leader for vendor neutral Wi-Fi certification and training. Carolina Advanced Digital, Inc. standardizes on CWNP certifications for its engineering and professional services team. The CWTS (Certified Wireless Technology Specialists) is the entry-level certification provided by CWNP and for many it’s the best first step in understanding the technical nuances of wireless. The CWTS certification is perfect for technologists entering the wireless field and for wired network administrators now finding themselves supporting a...
Read More
email email email email email email
profile iconPosted by cadinc

One trick for best match and best pricing on eRate networking gear

If you’ve seen any of the USAC training for eRate, you know it says schools shouldn’t submit 470s that require specific manufacturers or part numbers, but should instead provide a list technical requirements, or list a specific part number with an “or equivalent” statement. The problem with that “or equivalent” statement is that each competing provider may interpret the equivalent features differently, since there’s not parity across all features between manufacturer products. Those differences in certain features can cause drastic variances in the cost of the solution proposed to you. Challenges of an RFP based on specified device models For example, let’s pretend you write your RFP for an ACME Networking switch model 4248 or equivalent. That ACME 4248 switch may be a 48-port 10/100/1000 PoE switch with full dynamic routing capabilities, redundant power supplies, and options for add-on services like PIM. If the model you specified is outdated, or if the respondent is going to offer an equivalent option from a different manufacturer, there are several ways your needs might be interpreted. Some equivalent options for switches are matched on the form factor (1U-stack vs chassis), or on the port speeds and PoE requirements. Other times they’ll match the routing capabilities or fabric speed. From switch-to-switch, there won’t be a direct match of these features, so finding a different model that matches your specified model may be difficult. The result is that you’ll receive several quoted equivalent switches which meet some or most of the requirements, and/or you may receive quoted equivalent switches that match all the requirements but results in extreme over-specification and cost. Here’s a sample...
Read More
email email email email email email
profile iconPosted by cadinc

Top Influencers in Security You Should Be Following in 2015

from Tripwire For each influencer whom we have selected, we include their Twitter handle, blog URL and reasoning for selecting them. We also include their answer for what infosec-related superpower they would choose to have. This year’s list (in no particular order) has some old faces and some new. Do you agree with our choices? Who else would you have chosen? JENNIFER MINELLA | @jjx Jennifer Minella is a Contributing Analyst at Securosis and currently serves on the (ISC)2 Board of Directors. She has been named among the top women in security by SC Magazine and Information Security Buzz, and in November, NCTA announced her as 2014’s Tech Woman of the Year. Acknowledging her influence, we are pleased that she contributed to one of our articles about women being underrepresented in infosec. If you could have one infosec-related superpower, what would it be? There are so many super powers I’d love to have. Most of them would be useless 99% of the time, but fantastic parlor tricks. Like gravity control; who wouldn’t love that!? For InfoSec though, I’d have to narrow the field to: precognition, time travel or skill mimicry. Skill mimicry might be too little, too late, so we turn to precognition and time travel — which would yield similar results. Both a DeLorean and Einstein have demonstrated that time travel really screws with the whole space-time continuum, so to play it safe I’d have to pick precognition. Wouldn’t it be great to know what would happen and save yourself (your company, or your data) from something bad before it came to be? Read...
Read More
email email email email email email
profile iconPosted by Jennifer Minella

Special Feature: Our staff picks their favorite holiday flicks

It’s the holiday season and one of our favorite times of the year here at Carolina Advanced Digital, Inc. There’s nothing like cuddling up to a good Christmas flick (or five) on a cold, blustery December night. Even though we’ve seen them a thousand times, there’s always a special feeling when you hear laughter over a Griswold mishap or wonder if there will be enough Christmas spirit for Santa’s sleigh. We asked our staff around the office to pick their favorite holiday movie and here’s what they said! Christmas Vacation (1989) “Why? Because it’s just hilarious and I love to laugh!” — Michelle, VP of Business Operations “I used to watch it all the time when I was a kid, and Clark Griswold’s ill-fated attempt to create the perfect family Christmas still cracks me up.  Got to be my favorite Christmas movie, followed closely by those yuletide classics A Christmas Story and Die Hard.” — Rob Baxley, Network Engineer   A Christmas Story (1983) “It is what Christmas is about.” — Angela Lehman, Government Sales “It’s been a tradition in my family since 1997 to play the entire 24-hour marathon, and you can see scenes from the movie in the background of most of our family photos over the years.” — Julie Allen, Inside Sales Manager   Rudolph, the Red Nose Reindeer (1964) “My little sister and I build a fort to watch it together every year!” — Jennifer Cook, Government Sales   Christmas with the Kranks (2004) “Every year we would watch that one movie together as a family. Also who doesn’t love Tim Allen?!?!” — Heather Moore,...
Read More
email email email email email email
profile iconPosted by cadinc

Is Security Awareness Training Really Worth It? [Dark Reading]

from Dark Reading Experts weigh in on the value of end-user security training, and how to make education more effective. Nothing riles up information security professionals quicker than the question of how much to invest in security awareness training. Does it work? Is it worth the money? “There are three things you don’t talk about in security: religion, politics, and security awareness training,” says Jennifer Minella, VP of engineering with Carolina Advanced Digital and a member of the board for the International Information Systems Security Certifications Consortium, or (ISC)2. Read...
Read More
email email email email email email
profile iconPosted by Jennifer Minella