Meet the new Microsoft Surface Hub 2S for Federal

Meet the new Microsoft Surface Hub 2S for Federal

Bring Remote Teams Together Remote teamwork has never been easier with the light-weight, mobile Surface Hub 2S. Collaborate via Microsoft Teams, and stay engaged during meetings with a 4K+ quality screen and camera, along with enhanced speakers and mics. Take...

How to Prepare for Cloud Security (Post-COVID)

How to Prepare for Cloud Security (Post-COVID)

You might not be able to see it, but it’s here. Lingering in the virtual cyber sphere lay containerized packets of information from sensitive data to music and photos. More and more organizations are migrating to the cloud if they haven’t done so already. The pandemic...

Game Face On: Getting Serious About Data Breaches

Game Face On: Getting Serious About Data Breaches

An August T-Mobile data breach affecting more than 53 million people including current, former and prospective customers is one of many recent cyber attacks to flood headlines. The breach led to two class action lawsuits filed by customers and accuses the company of...

Four Tools & Tips to Properly Secure Your Network

Four Tools & Tips to Properly Secure Your Network

A recent report issued by a U.S. Senate Committee revealed that America’s data is in fact still at risk. Cybersecurity at eight federal agencies was found to be so poor that four of them earned grades of D, three got Cs, and only one received a B. The report also...

Full Speed Ahead: Preparing Higher Ed Networks for a Hybrid Future

Full Speed Ahead: Preparing Higher Ed Networks for a Hybrid Future

School is out and summer is in – but not for long. With more restrictions lifting across the U.S., higher education institutions will soon switch to a hybrid learning model, offering both in-person and online instruction. While this sounds beneficial to IT departments...

Hot Take: Should Paying Ransoms be Illegal?

Hot Take: Should Paying Ransoms be Illegal?

It’s everywhere – national headlines, talk shows, podcasts, blogs and social media. The latest topic in tech has everyone talking: should paying off ransomware criminals be illegal? Following the recent increase in ransomware attacks around the globe, governments are...

Addressing Security Challenges in the ‘New Normal’

Addressing Security Challenges in the ‘New Normal’

While more businesses are returning to the office, the world we live in is still very far from ‘normal.’ As companies play catch up to our new reality, they will need to re-establish effective controls over new working models and IT and security challenges. During...

The Price is Right: The Cost of $ecurity for Colonial Pipeline

The Price is Right: The Cost of $ecurity for Colonial Pipeline

The May 7, 2021 cybersecurity attack on Colonial Pipeline is the latest ransomware attack to widely disrupt national infrastructure and one of our nation’s largest and most successful attacks to date. Like most Americans, we bet you’re extremely familiar with this...

The Future of Enterprise Security: 5G Edge Computing

The Future of Enterprise Security: 5G Edge Computing

Digital innovation is all around us. New technologies and advances enter the market each and every day, and 5G edge computing is just one example of digital innovation at its best. While 5G edge computing is poised to improve the performance of applications and enable...

Carolina Advanced Digital Announces SOC as a Service

Carolina Advanced Digital Announces SOC as a Service

FOR IMMEDIATE RELEASE Carolina Advanced Digital Announces SOC as a Service All-inclusive service suites expand SOC services for small to mid-sized organizations Raleigh, N.C. (May 28, 2021) – Carolina Advanced Digital, a nationally-recognized leader in technology...

The State of Security: April Update

The State of Security: April Update

Over the past few years, it’s become clear that the U.S. government is under-prepared in matters of cybersecurity, a fact underscored by the pandemic and recent breaches like the SolarWinds incident. From energy, industrial and supply chain to military and government...

Women’s History Month Team Spotlight

Women’s History Month Team Spotlight

Happy Women’s History Month! Here at Carolina Advanced Digital, we’ve got a stellar group of women helping lead our team. From sales and marketing to account managers to engineers, these women have not only impacted our company but have helped shape our field for...

High Risks in Higher Education: 2021 Security Outlook

High Risks in Higher Education: 2021 Security Outlook

COVID-19 has changed nearly every aspect of our lives, not to mention the operations of entire industries. Think about it: what does your ‘new normal’ look like? For higher ed institutions, it consists of the rapid switch to online learning to ensure the physical...

COVID-19 & 2021 Cybersecurity Predictions

COVID-19 & 2021 Cybersecurity Predictions

In the wise words of Will Smith, our lives have indeed been flipped turned upside down. And if the title of this article made you do a double take, you’re not alone. Cybersecurity predictions for 2021— where’d all the time go? Well, we’d like to take a minute so just...

Microsoft Surface family for Federal users

Microsoft Surface family for Federal users

In a time of international crisis, federal governments are stepping up to lead. Modernizing your office technology can better position your organization to address increased expectations and optimize your citizen engagement. Microsoft Surface devices and software...

The Wild, Wild, World of Wi-Fi and MAC Randomization

The Wild, Wild, World of Wi-Fi and MAC Randomization

If one thing's for sure, it’s that the wild, wild world of Wi-Fi stops for no one. As a matter of fact, it doesn’t stop for anything at all and has become even more popular during the coronavirus pandemic following the uptick of remote workers. Back in July, Apple...

Digital Transformation and Real Network Automation in Action

Digital Transformation and Real Network Automation in Action

If your organization is looking to streamline operations through automation and the use of AI/ML, then chances are you've heard of Mist. Other manufacturers are on board the AI/ML train too, and we're eager to see where the technology takes us, but for now we believe...

So you wanna try Mist? Here’s how

So you wanna try Mist? Here’s how

At Carolina Advanced Digital, we've been designing and deploying enterprise Wi-Fi solutions for 20 years, so it's hard to get us excited about "yet another Wi-Fi product" -- but here we are! Our clients are really loving the Mist AI platform for networking, and we’d...

Why you want Aruba’s NetEdit tool for managing switches

Why you want Aruba’s NetEdit tool for managing switches

With the new Aruba CX switches came a nifty tool that doesn't seem to be getting the attention it deserves (yet). We think when you see this tool, you'll fall in love just like we did. NetEdit has all the usual network management tidbits you've come to know and...

Aruba’s New Edge and Tomorrow’s Network Minions

Aruba’s New Edge and Tomorrow’s Network Minions

At Aruba's virtual Atmosphere event recently, they announced a vision around the network having a 'sixth sense'. Throughout the virtual sessions and demos one thing became obvious - Aruba is finally executing on its strategy to pull its portfolio in to a tighter weave...

New Tech Talk Video Podcast Series Q3 lineup

New Tech Talk Video Podcast Series Q3 lineup

A love child of a video podcast and webinar, our new Tech Talk series will be sure to amaze and entertain. In these casual sessions, our engineering team will lead discussions on today’s top technology trends, answer client questions, and discuss solutions. Expect a...

3 Tips for Keeping Your Enterprise Safe in the Era of IoT

3 Tips for Keeping Your Enterprise Safe in the Era of IoT

Do you ever stop to think about the rate at which the technology around us is evolving? Most people don’t. Technology is so ingrained into our everyday lives that the rapid digital transformation across entire industries goes unnoticed. Perhaps the most destructive,...

3 Steps to Manage Your Enterprise’s Digital Footprint

3 Steps to Manage Your Enterprise’s Digital Footprint

Think about how many things you touch each day. Whether it’s a door handle, a box at the grocery store or a simple handshake, your fingerprints are everywhere. Now think about your online activity. How many websites do you browse each day? What social platforms do you...

Post COVID-19: 4 Emerging New-Age Tech Security Challenges

Post COVID-19: 4 Emerging New-Age Tech Security Challenges

If you’re like the majority of the world’s population, you’re probably cooped up in your home, wondering when life will return to normal. We hate to break it to you, but the new ‘normal’ won’t be so normal. The virtual workforce explosion has not only altered our...

The Future of Cybersecurity: COVID-19 Impacts

The Future of Cybersecurity: COVID-19 Impacts

Cybersecurity was important pre-COVID-19, and it will be even more important post-COVID-19. As people around the globe are required to work from home, telework is becoming engrained into the fabric of billions of organizations, whether they like it or not. Does this...

How to Properly Support Your CISOs and IT Staff

How to Properly Support Your CISOs and IT Staff

What’s tech-savvy, focused and brings business success full circle? You guessed it— CISOs. CISOs and IT leaders are vital to the success of every organization. They’re the key orchestrators of an organization’s security performance and ensure that information assets...

Top 3 Security Concepts for WLAN Pros

Top 3 Security Concepts for WLAN Pros

Cybersecurity is a top priority for every organization and securing our organizations’ networked infrastructures plays a major role in the success of a meaningful security strategy. So why should Wi-Fi pros care about security? For starters, we live in a world where...

COVID-19 Cybersecurity Checklist: 4 Steps to Secure Remote Workers

COVID-19 Cybersecurity Checklist: 4 Steps to Secure Remote Workers

COVID-19, better known as the coronavirus, has imposed tremendous impacts on economies, financial markets, hospitality, tourism, manufacturing and transportation industries worldwide. As this virus continues to spread rapidly, many businesses and schools are closing...

Tech Q&A: Will my current infrastructure support client VPNs?

Tech Q&A: Will my current infrastructure support client VPNs?

With the onset of the COVID-19 pandemic, many organizations are asking some variation of the question “will my infrastructure support remote access for my employees”.  This is evident by the fact that VPN usage in the U.S. grew by 53% between March 9th and 15th...

5 Technical Recommendations for COVID-19 and Pandemic Preparation

5 Technical Recommendations for COVID-19 and Pandemic Preparation

We asked the engineering team what customers should be considering during the time of COVID-19 and other pandemic or natural disasters. Be aware of phishing emails Phishing emails and malicious activity increase during times of crisis. Attackers are opportunistic, so...

3 Ways to Measure the Effectiveness of Your Cybersecurity Program

3 Ways to Measure the Effectiveness of Your Cybersecurity Program

No one thinks they’re at risk of being targeted until it’s too late. A security attack can wreak havoc on any individual or company, causing potential legal, financial and operational disturbance. With more emerging security threats on the horizon than ever before,...

Our Best CLI Cheat Sheet: Cisco, Aruba CX, and Aruba OS Switch

Our Best CLI Cheat Sheet: Cisco, Aruba CX, and Aruba OS Switch

This is the latest version of our favorite CLI Reference Guide showing popular platforms side-by-side for easy configuration on Cisco and Aruba. If you’ve purchased HPE Aruba Networking equipment from us (Carolina Advanced Digital), and/or if you’ve worked with our...

The Weak Link in Cloud Security

The Weak Link in Cloud Security

The popularity of cloud computing has continued to rise with the emergence of digital transformation initiatives. Whether it public, private or hybrid, cloud architecture offers cost-effective and scalable computing power. While cloud computing is more secure than...

2020 Cybersecurity Predictions

2020 Cybersecurity Predictions

Imagine this: The year is 2020. You sit down for dinner and notice your children’s eyes are glued to the device in front of them. Your partner calls out from the kitchen, “Alexa, what time is my hair appointment tomorrow?” Suddenly, your Bluetooth-enabled crockpot...

2019 National Cybersecurity Awareness Month

2019 National Cybersecurity Awareness Month

It’s spooky season! There’s no better time to celebrate National Cybersecurity Awareness Month than October, a month dedicated to both tricks and treats. While cybersecurity may seem like a scary topic, there’s no need to fear. Treat yourself to peace of mind this...

Meet Joe Caiola, Director of Service Delivery

Meet Joe Caiola, Director of Service Delivery

CAD Q&A Blog Series | Employee Interview This ain’t your grandma’s IT-shop. At Carolina Advanced Digital, we’ve mastered the art of having fun while we get the job done. A company is only as good as its employees, and as a nationally-recognized leader in...

Recruiting & Maintaining Top Cybersecurity Talent

Recruiting & Maintaining Top Cybersecurity Talent

We’ve all heard it before: the cybersecurity industry is suffering from a lack of skilled professionals. Unfortunately, demand for top cybersecurity talent is at an all-time high and is expected to continue rising. To attract the industry’s best and brightest, we must...

A New Era of Security: Passwordless Authentication

A New Era of Security: Passwordless Authentication

Passwords were created to block unwanted users from accessing systems and networks. Today, they have become the weakest link in cybersecurity. As hackers continue to compromise the personal data of millions worldwide, an examination of major breaches has revealed the...

Jennifer Minella Ranks #4 in Security Thought Leadership

Jennifer Minella Ranks #4 in Security Thought Leadership

Our VP of Engineering & Security is dominating 2019. This year alone, Jennifer Minella has been featured in Cyber Ventures “Women Know Cyber: 100 Fascinating Females Fighting Cybercrime” and spoken at industry-leading events including the RSA Conference and the...

The Impact of 5G in Cybersecurity

The Impact of 5G in Cybersecurity

Everyone wants 5G, and the hype surrounding its launch only continues to grow. Wireless providers have promised that the 5G rollout will bring faster speeds, instantaneous communication and global interconnectivity. This next generation of wireless connectivity is...

Building a Security-Centric Culture in a Digital Age

Building a Security-Centric Culture in a Digital Age

Cyber is here, there and everywhere in between. As our technology-dependent world grows, consumers and organizations alike are eager to adopt the latest innovations. Digital transformation has many people focused on IoT, SD-WAN and the cloud while the topic of...

Carolina Advanced Digital Announces SOC as a Service

Carolina Advanced Digital Announces New Headquarters Relocation

Larger office enables company expansion to support new and existing clients and services Raleigh, N.C. (June 19, 2019) – Carolina Advanced Digital, a nationally-recognized leader in technology infrastructure and security solutions, announced that the company’s...

Demystifying Artificial Intelligence (AI)

Demystifying Artificial Intelligence (AI)

Artificial intelligence (AI), one of many double-edged swords in technology, is expected to incite both positive and negative impacts on people and industries worldwide. It’s constantly evolving and as technological advancements emerge, these changes are leading many...

Advanced Persistent Threats | Know Them & Stop Them

Advanced Persistent Threats | Know Them & Stop Them

Advanced persistent threat (APT) attackers are the top attackers of the cyber chain. Sounds scary, right? What’s worse is that these groups can steal your organization’s data and navigate its network without ever being noticed. APT is a broad term used to describe an...

IT Hot Topics Conference Spotlight: Chuck Kesler

IT Hot Topics Conference Spotlight: Chuck Kesler

IT Hot Topics 2019 was a success! We’d like to give a big shout out to all of our conference go’ers, speakers, sponsors and Carolina Advanced Digital teams for making this our hottest conference yet. We hope to see everyone back at the Grandover Resort next year! We...

IT Hot Topics Conference Spotlight: Stacy Thayer, Ph.D.

IT Hot Topics Conference Spotlight: Stacy Thayer, Ph.D.

Are you ready for IT Hot Topics 2019? We sure are! In just a few days, the industry’s best and brightest will join conference goers for three days of networking, keynotes and hands-on workshops. We recently spoke with Dr. Stacy Thayer, independent organizational...

IT Hot Topics Conference Spotlight: Diana Kelley

IT Hot Topics Conference Spotlight: Diana Kelley

IT Hot Topics 2019 is right around the corner! This conference is going to be hot, hot, hot— and it’s in part to our incredible speakers who have volunteered their time and talent to teaching current and emerging security professionals about the ever-evolving...

The Fast and the Furious: Wi-Fi 6

The Fast and the Furious: Wi-Fi 6

The future of Wi-Fi is scheduled to officially arrive in 2019. Wi-Fi 6, the simplified name for 802.11ax issued by the Wi-Fi Alliance in 2018, will support everything you want to do with your wireless LANs. Not only does it promise to live up to the hype, but it’s...

Rise in Cyber Attacks Increase Growth of Cloud-Based SIEM Solution

Rise in Cyber Attacks Increase Growth of Cloud-Based SIEM Solution

The rise in technological advancements and dependence on online platforms means cybersecurity solutions are more important now than ever before. In 2018, 765 million individuals were affected by cybersecurity attacks and data breaches in the months of April, May and...

RSAC 2019 | Long Live the Firewall?

RSAC 2019 | Long Live the Firewall?

Culminating world-class leaders in cybersecurity, RSA Conference 2019 was packed with insightful seminars, speakers, tutorials, training sessions and innovation programs. Our very own, Jennifer Minella, VP of Engineering and Security, brought the heat as a panelist on...

Help the World be Safe and Secure Online

Help the World be Safe and Secure Online

In celebration of National Cybersecurity Awareness Month, we'd like to introduce you to the Center for Cyber Safety & Education, a charitable trust that offers training and education for children and seniors, as well as scholarship programs. The Center makes...

Celebrating Our Top Cyber Security Solutions

Celebrating Our Top Cyber Security Solutions

Since it's National Cybersecurity Month, we're sharing some of our top security solutions including a few new faces. New Endpoint Security solutions Crowdstrike SentinelOne New SIEM & UEBA solutions LogRhythm Updated NAC solutions Fortinet FortiNAC (formerly...

Carolina Advanced Digital Named Finalist for NC TECH Private Company Award

Carolina Advanced Digital Announced as 2018 NC TECH Awards Finalist

FOR IMMEDIATE RELEASE Carolina Advanced Digital Announced as 2018 NC TECH Awards Finalist Family-owned company recognized for innovative use of technology for customer service Raleigh, N.C. (October 1, 2018) – Carolina Advanced Digital, a nationally-recognized leader...

Out ‘n About – October Events

Out ‘n About – October Events

Look for our teams at these upcoming October events. Also check our event calendar for more upcoming conferences and events. Oct 1-3: UNC Cause 2018 @ Greenville Oct 8-9: NCHICA 24th Annual Conference @ Charlotte Oct 22-23: SCITDA (SC IT Directors Association) @...

Carolina Advanced Digital Earns ISO 20243 Certification for Supply Chain Security

SecureDoc, PCI DSS, and TLS 1.2 by June 30, 2018 [Product Update]

For our clients using Winmagic SecureDoc and required to meet PCI DSS standards, please read this important Product Update. Are you still using Secure Sockets Layer (SSL) or early Transport Layer Security (TLS) protocols? As a valued partner of WinMagic, we want to...

Healthcare buzz podcast with our Director of Strategic Accounts

Healthcare buzz podcast with our Director of Strategic Accounts

Our very own Wayne Gaudette, Director of Strategic Accounts joins Janet Kennedy of Get Social Health​ for a discussion about healthcare, cybersecurity, and NCHICA. They discuss: Leading cybersecurity issues in healthcare Why healthcare is unique in use cases Solutions...

Carolina Advanced Digital Earns ISO 20243 Certification for Supply Chain Security

Professional Services team credentials in 2017

Both our technical and sales teams work tirelessly to stay up to speed on the industry, market segment needs, as well as manufacturer solutions. It's no surprise then that our teams are constantly gaining knowledge through events, training, and certification. The...

Advisory from Carolina Advanced Digital on new Wi-Fi KRACK attack

Advisory from Carolina Advanced Digital on new Wi-Fi KRACK attack

Advisory from Carolina Advanced Digital on new Wi-Fi KRACK attack Ref: CERT advisory Wi-Fi Protected Access II (WPA2) handshake traffic can be manipulated to induce nonce and session key reuse Contents Executive summary Technical highlights Recommended actions Anatomy...

Watch RSAC TV’s interview with Jennifer Minella, VP of Engineering

Watch RSAC TV’s interview with Jennifer Minella, VP of Engineering

Jennifer Minella, VP of Engineering and Security, Carolina Advanced Digital, Inc., is interviewed by Paul Roberts, Editor in Chief and Founder of the Security Ledger. In this 2017 interview during the RSAC USA Conference, Paul and Jennifer discuss diversity, why the...

Look for our new event display booth

Look for our new event display booth

If you're roaming the halls of the next IT or information security event, keep an eye out for our new event booth display being used by our sales and events team.

RSAC’s Q&A Series with Jennifer Minella & Mark Nunnikhoven

RSAC’s Q&A Series with Jennifer Minella & Mark Nunnikhoven

The RSAC editorial team ask our VP of Engineering Jennifer Minella and professional colleague Mark Nunnikhoven of Trend Micro for the "off topic" tips and tricks for getting the most out of the RSA Conference in San Francisco. In the two-part Q&A series, the RSAC...

Saluting All of Our Veterans

Saluting All of Our Veterans

Today is Veterans Day, a day we join together to salute all American veterans, share our appreciation for their service, and recognize the sacrifices they have made in their lives to keep America free and safe. We know there are many family, friends, partners, and...

Our Advice for Staying Safe Online at Family Internet Safety Night

Our Advice for Staying Safe Online at Family Internet Safety Night

This week, Carolina Advanced Digital VP of Engineering Jennifer Minella addressed an audience at the Chapel Hill Family Internet Safety Night, an event planned by the Chapel Hill Police Department with Chapel Hill-Carrboro Schools which drew more than 75 students,...

Featured in NASA SEWP V Contract Guide for Federal Buyers

Featured in NASA SEWP V Contract Guide for Federal Buyers

The 2015-2016 Contract Guide for the new NASA SEWP V contract is out! Learn more about this government-wide contract, our company -- Carolina Advanced Digital -- and the breadth of products and services available through our NASA SEWP V contract. Carolina Advanced...

Our Best CLI Cheat Sheet: Cisco and HP

Our Best CLI Cheat Sheet: Cisco and HP

If you've purchased HP Networking equipment from us (Carolina Advanced Digital), and/or if you've worked with our Professional Services team on networking projects, you're probably familiar with our go-to resource for all things CLI -- The HP Networking and Cisco CLI...

Carolina Advanced Digital Earns ISO 20243 Certification for Supply Chain Security

Wi-Fi News: Connecting 5K+ Gamers at One of World’s Largest Events

Our partner Meru Networks has a constant stream of success stories with the incredibly high density demands of environments as diverse and challenging as outdoor stadiums to the confined and RF-choking construction of a cruise ship. Today's story of how Meru Networks...

CIOs share their secrets to unplugging on vacation [CIO]

CIOs share their secrets to unplugging on vacation [CIO]

from CIO Magazine IT executives have learned how to build strong, reliable and trustworthy teams so that no one person is the single point of contact. That not only allows for more efficiency, it lets CIOs unplug on summer vacations. ... “I put a lot of stock into a...

Carolina Advanced Digital Earns ISO 20243 Certification for Supply Chain Security

Carolina Advanced Digital Nets $20B NASA Contract [Dark Reading]

from Dark Reading   “Carolina Advanced Digital has already been extraordinarily active and successful in providing security solutions to our federal partners,” said John Jabbusch, President and Chief Engineer at Carolina Advanced Digital. “This contract ensures...

Carolina Advanced Digital Earns ISO 20243 Certification for Supply Chain Security

Security: Top Twitter Influencers to Follow [Techopedia]

By Techopedia Staff, find VP of Engineering Jennifer Minella Takeaway: Stay on top of the latest news and views on cybersecurity by following these top influencers on Twitter. If there's one area of the tech industry that's undoubtly growing - and growing fast - it's...

Carolina Advanced Digital Earns ISO 20243 Certification for Supply Chain Security

Congratulations to Carolina Advanced Digital, Inc. [NCMBS]

from NC Military Business Center April 9th, 2015 | Author: Courtney Smedick Carolina Advanced Digital, Inc. is Awarded a 10-Year, $20B NASA Solutions for Enterprise-Wide Procurement V (SEWP V) Contract in Group C: Small Business Set-Aside [button...

Carolina Advanced Digital Earns ISO 20243 Certification for Supply Chain Security

(ISC)²® Board of Directors Elects 2015 Officers

from (ISC)2   Global team of security professionals elected to lead governing body of world’s largest cybersecurity membership Clearwater, Fla., January 29, 2015 — (ISC)²® (“ISC-squared”), the largest not-for-profit membership body of certified information and...

Carolina Advanced Digital Earns ISO 20243 Certification for Supply Chain Security

Top Influencers in Security You Should Be Following in 2015

from Tripwire For each influencer whom we have selected, we include their Twitter handle, blog URL and reasoning for selecting them. We also include their answer for what infosec-related superpower they would choose to have. This year’s list (in no particular order)...

Carolina Advanced Digital Earns ISO 20243 Certification for Supply Chain Security

Is Security Awareness Training Really Worth It? [Dark Reading]

from Dark Reading Experts weigh in on the value of end-user security training, and how to make education more effective. Nothing riles up information security professionals quicker than the question of how much to invest in security awareness training. Does it work?...

Carolina Advanced Digital Earns ISO 20243 Certification for Supply Chain Security

NC Tech Awards unveiled [News & Observer]

from the News & Observer   The North Carolina Technology Association handed out 25 NC Tech Awards to individuals and organizations from across the state at its annual awards dinner Thursday evening at the Raleigh Convention Center. ... Private Sector Chief...

Carolina Advanced Digital Earns ISO 20243 Certification for Supply Chain Security

Dynamic Frequency Selection: Why It’s Critical In 802.11ac

Full article by VP of Engineering Jennifer Minella can be found at Network Computing DFS is the focus of much debate in the wireless industry. Here's why it's a crucial requirement with the arrival of 802.11ac devices.  Dynamic Frequency Selection (DFS) has been a...

Carolina Advanced Digital Earns ISO 20243 Certification for Supply Chain Security

2014 Women in IT Security: Jennifer Minella [SC Magazine]

VP of Engineering, Jennifer Minella, featured in SC Magazine   In her present position as VP of engineering at Carolina Advanced Digital, she manages the firm's consulting and professional services, and is one of four principals helping drive business strategy...

Carolina Advanced Digital Earns ISO 20243 Certification for Supply Chain Security

Security: The Good, the Bad, and the Alternative [DarkMatters]

from Norse Security Dark Matters I began this third blog post by begging the question, “are women underrepresented and smacked down in the Infosec community?” With an industry that is dominated by men — I blatantly stated that I had heard both sides of the coin. From...

Carolina Advanced Digital Earns ISO 20243 Certification for Supply Chain Security

87 Security Experts You Need to Be Following on Twitter

from Security Innovation Europe, you'll find VP of Engineering Jennifer Minella on this list   As computers become exponentially more involved in our everyday working lives, security is an increasing concern. It’s therefore essential for security conscious...

Carolina Advanced Digital Earns ISO 20243 Certification for Supply Chain Security

100 Security Experts to Follow on Twitter

from Marble Security, find VP of Engineering Jennifer Minella   As the worldwide security technology market is forecasted to grow 28% by 2016, according to Gartner, companies are continuing to strengthen their security technologies. With security being the...

Carolina Advanced Digital Earns ISO 20243 Certification for Supply Chain Security

Top 25 Female Infosec Leaders to Follow on Twitter

from Information Security Buzz Last week we posted an article on the 25 Information Security Leaders to follow on Twitter, unfortunately, as some of our eagle eyed readers pointed out, our list was dominated by men. In reflection of this, we have created another...

Carolina Advanced Digital Earns ISO 20243 Certification for Supply Chain Security

What Are the Most Overrated Security Technologies? [CSO Online]

from CSO Online   The security community has grown to depend on some basic technologies in the fight against cyber thieves, such as antivirus software and firewalls. But are practitioners clinging to tools that outlived their usefulness long ago? Were those tools...

Carolina Advanced Digital Earns ISO 20243 Certification for Supply Chain Security

Hewlett-Packard, CCCC sign ProCurve training contract [CCCC]

from Central Carolina Community College systems news   SANFORD — Central Carolina Community College has become the first public educational institution in North America to offer training in Hewlett Packard’s ProCurve Networking products.  The college and...

Carolina Advanced Digital Earns ISO 20243 Certification for Supply Chain Security

Five More Ways to Cut Costs Without Cutting Services [CIO Update]

from CIO Update Last month I wrote about five ways your organization could cut costs without cutting services. While that article offered advice on embracing data center automation, exploring open-source software and eliminating duplicate software, there were several...

Carolina Advanced Digital Earns ISO 20243 Certification for Supply Chain Security

Carolina Advanced Digital moving HQ to Cary [TBJ]

from Triangle Business Journal   Carolina Advanced Digital Inc., an engineering firm that specializes in IT work, is moving its headquarters to Cary after 25 years in Siler City, the company announced Tuesday. CAD will make its new home at 133 Triangle Trade...

Carolina Advanced Digital Earns ISO 20243 Certification for Supply Chain Security

Start-Up Success: Carolina Advanced Digital [NaVOBA]

from National Veteran-Owned Business Association   Families start businesses all the time – a restaurant on the street corner or a grocery store in the center of town. Sometimes, however, families have bigger aspirations, like starting an information technology...

Carolina Advanced Digital Earns ISO 20243 Certification for Supply Chain Security

Pen Testing: Dead in 2009 [CSO Online]

from CSO Online Does pen testing belong in the QA department? Fortify Co-Founder and Chief Scientist Brian Chess says 2009 will mark the end of pen tests as we know them. His theory is being met with resistance. ... Naturally, security practitioners who swear by pen...

Carolina Advanced Digital Earns ISO 20243 Certification for Supply Chain Security

Defeating the Dark Side: How to Defend Against Emerging Attacks

A long time ago in a galaxy far, far away, hacking was born. Over the years, hacking has evolved into a complex system characterized by advanced technologies, attackers and vulnerable networks. Cybercriminals are like the Sith, lurking in the shadows and plotting...