What's Shaking at Carolina Advanced Digital
Explore our recent news, media coverage, and upcoming events and webinars.
For communications professionals, our media kit contains a corporate overview, principal profiles, logos, and graphics. -Coming Soon-
Countdown to IT Hot Topics Conference 2019
Right now, many of our clients are looking for ways to support a suddenly remote workforce, as the impact of COVID-19 ripples through the U.S. Here are 4 enterprise-grade remote access solutions that can be deployed with proper security controls and oversight.
VPN usage in the U.S. grew by 53% in 1 week. With the onset of the COVID-19 pandemic, many organizations are asking some variation of the question “will my infrastructure support remote access for my employees?” We asked the engineering team how they’re answering these
client questions, and here’s what they shared.
We asked the engineering team what customers should be considering during the time of COVID-19 and other pandemic or natural disasters.
Through these interactions and experiences, students can explore firsthand the topics and careers they are interested in. The Black Falcons have produced dozens of cybersecurity professionals over the years, two of which went on to work for the National Security Agency (NSA). If we want to bridge the talent gap, we must continue to support programs that are designed to encourage younger generations to pursue careers in cybersecurity and STEM-related fields. Help us get students excited about cyber!
69% of CEOs believe a strong cyber strategy is critical to building trust with key stakeholders, but many respondents still lack the preparation needed to handle a cyber event. One way to know if security controls are defending your organization is to conduct frequent tests. Several measures can be implemented to help an organization gauge the effectiveness of its existing security
In infosec, the mantra has always been that compliance does not equal security and these new programs will prove no different. Data compliance should be used as a framework to address cybersecurity risks. To maintain effective security and compliance, follow these four steps.
Deepfake technology is being used to compromise enterprises in new and creative ways. Learn why deepfake attacks bring a much higher risk, and how to protect your organization from related phishing and social engineering attacks that exploit this new use of AI.
While we offer services to review and assess firewall rules for security, if you have the resources in-house, organizations can tackle this by configuring rules to log (audit mode) temporarily and reviewing the to see which are being used. If it hasn’t already been done (and documented) further research should be done to review the in-use rules, identify the resources in play, and make sure there’s a business case documented for each policy or rule set.
This is the latest version of our favorite CLI Reference Guide showing popular platforms side-by-side for easy configuration on Cisco and Aruba. If you’ve purchased HPE Aruba Networking equipment from us (Carolina Advanced Digital), and/or if you’ve worked with our...