Navigating the Future of Federal Work with Surface

Navigating the Future of Federal Work with Surface

Join us for an insightful session as we delve into the world of Microsoft Surface devices and their transformative impact on Federal agencies and government sectors. This webinar is designed to help you understand how Surface devices are revolutionizing the government...

Transforming Federal Workspaces with Surface Hub 2S

Transforming Federal Workspaces with Surface Hub 2S

Join us for a captivating session as we explore the transformative potential of Microsoft's Surface Hub 2S for Federal agencies and government sectors. This webinar is specially designed to showcase how Surface Hub 2S is reshaping the collaboration landscape in...

Meet the new Microsoft Surface Suite

Meet the new Microsoft Surface Suite

Meet the Surface Family This is an important time for government, and being able to step up efficiently and effectively is critical. Do you have the tools you need? With so much shifting in government right now, I thought it might be helpful for you to see how others...

Meet the new Microsoft Surface Hub 2S for Federal

Meet the new Microsoft Surface Hub 2S for Federal

Bring Remote Teams Together Remote teamwork has never been easier with the light-weight, mobile Surface Hub 2S. Collaborate via Microsoft Teams, and stay engaged during meetings with a 4K+ quality screen and camera, along with enhanced speakers and mics. Take...

Meet the Microsoft Surface Products for Federal

Meet the Microsoft Surface Products for Federal

Powerful versatilityWork the way you want with our ultra-light 2-in-1. Surface Pro 7+ is portable enough to take anywhere starting at just 1.7 pounds,1 yet powerful enough to handle all your business apps. Get intensive tasks done 2.1 times faster than before and...

How to Prepare for Cloud Security (Post-COVID)

How to Prepare for Cloud Security (Post-COVID)

You might not be able to see it, but it’s here. Lingering in the virtual cyber sphere lay containerized packets of information from sensitive data to music and photos. More and more organizations are migrating to the cloud if they haven’t done so already. The pandemic...

Game Face On: Getting Serious About Data Breaches

Game Face On: Getting Serious About Data Breaches

An August T-Mobile data breach affecting more than 53 million people including current, former and prospective customers is one of many recent cyber attacks to flood headlines. The breach led to two class action lawsuits filed by customers and accuses the company of...

Four Tools & Tips to Properly Secure Your Network

Four Tools & Tips to Properly Secure Your Network

A recent report issued by a U.S. Senate Committee revealed that America’s data is in fact still at risk. Cybersecurity at eight federal agencies was found to be so poor that four of them earned grades of D, three got Cs, and only one received a B. The report also...

High Risks in Higher Education: 2021 Security Outlook

High Risks in Higher Education: 2021 Security Outlook

COVID-19 has changed nearly every aspect of our lives, not to mention the operations of entire industries. Think about it: what does your ‘new normal’ look like? For higher ed institutions, it consists of the rapid switch to online learning to ensure the physical...

New Tech Talk Video Podcast Series Q3 lineup

New Tech Talk Video Podcast Series Q3 lineup

A love child of a video podcast and webinar, our new Tech Talk series will be sure to amaze and entertain. In these casual sessions, our engineering team will lead discussions on today’s top technology trends, answer client questions, and discuss solutions. Expect a...

3 Tips for Keeping Your Enterprise Safe in the Era of IoT

3 Tips for Keeping Your Enterprise Safe in the Era of IoT

Do you ever stop to think about the rate at which the technology around us is evolving? Most people don’t. Technology is so ingrained into our everyday lives that the rapid digital transformation across entire industries goes unnoticed. Perhaps the most destructive,...

3 Steps to Manage Your Enterprise’s Digital Footprint

3 Steps to Manage Your Enterprise’s Digital Footprint

Think about how many things you touch each day. Whether it’s a door handle, a box at the grocery store or a simple handshake, your fingerprints are everywhere. Now think about your online activity. How many websites do you browse each day? What social platforms do you...

Post COVID-19: 4 Emerging New-Age Tech Security Challenges

Post COVID-19: 4 Emerging New-Age Tech Security Challenges

If you’re like the majority of the world’s population, you’re probably cooped up in your home, wondering when life will return to normal. We hate to break it to you, but the new ‘normal’ won’t be so normal. The virtual workforce explosion has not only altered our...

How to Properly Support Your CISOs and IT Staff

How to Properly Support Your CISOs and IT Staff

What’s tech-savvy, focused and brings business success full circle? You guessed it— CISOs. CISOs and IT leaders are vital to the success of every organization. They’re the key orchestrators of an organization’s security performance and ensure that information assets...

Tech Q&A: Will my current infrastructure support client VPNs?

Tech Q&A: Will my current infrastructure support client VPNs?

With the onset of the COVID-19 pandemic, many organizations are asking some variation of the question “will my infrastructure support remote access for my employees”.  This is evident by the fact that VPN usage in the U.S. grew by 53% between March 9th and 15th...

5 Technical Recommendations for COVID-19 and Pandemic Preparation

5 Technical Recommendations for COVID-19 and Pandemic Preparation

We asked the engineering team what customers should be considering during the time of COVID-19 and other pandemic or natural disasters. Be aware of phishing emails Phishing emails and malicious activity increase during times of crisis. Attackers are opportunistic, so...

3 Ways to Measure the Effectiveness of Your Cybersecurity Program

3 Ways to Measure the Effectiveness of Your Cybersecurity Program

No one thinks they’re at risk of being targeted until it’s too late. A security attack can wreak havoc on any individual or company, causing potential legal, financial and operational disturbance. With more emerging security threats on the horizon than ever before,...

The Weak Link in Cloud Security

The Weak Link in Cloud Security

The popularity of cloud computing has continued to rise with the emergence of digital transformation initiatives. Whether it public, private or hybrid, cloud architecture offers cost-effective and scalable computing power. While cloud computing is more secure than...

A New Era of Security: Passwordless Authentication

A New Era of Security: Passwordless Authentication

Passwords were created to block unwanted users from accessing systems and networks. Today, they have become the weakest link in cybersecurity. As hackers continue to compromise the personal data of millions worldwide, an examination of major breaches has revealed the...

Jennifer Minella Ranks #4 in Security Thought Leadership

Jennifer Minella Ranks #4 in Security Thought Leadership

Our VP of Engineering & Security is dominating 2019. This year alone, Jennifer Minella has been featured in Cyber Ventures “Women Know Cyber: 100 Fascinating Females Fighting Cybercrime” and spoken at industry-leading events including the RSA Conference and the...

The Impact of 5G in Cybersecurity

The Impact of 5G in Cybersecurity

Everyone wants 5G, and the hype surrounding its launch only continues to grow. Wireless providers have promised that the 5G rollout will bring faster speeds, instantaneous communication and global interconnectivity. This next generation of wireless connectivity is...

Building a Security-Centric Culture in a Digital Age

Building a Security-Centric Culture in a Digital Age

Cyber is here, there and everywhere in between. As our technology-dependent world grows, consumers and organizations alike are eager to adopt the latest innovations. Digital transformation has many people focused on IoT, SD-WAN and the cloud while the topic of...

Demystifying Artificial Intelligence (AI)

Demystifying Artificial Intelligence (AI)

Artificial intelligence (AI), one of many double-edged swords in technology, is expected to incite both positive and negative impacts on people and industries worldwide. It’s constantly evolving and as technological advancements emerge, these changes are leading many...

Advanced Persistent Threats | Know Them & Stop Them

Advanced Persistent Threats | Know Them & Stop Them

Advanced persistent threat (APT) attackers are the top attackers of the cyber chain. Sounds scary, right? What’s worse is that these groups can steal your organization’s data and navigate its network without ever being noticed. APT is a broad term used to describe an...

Celebrating Our Top Cyber Security Solutions

Celebrating Our Top Cyber Security Solutions

Since it's National Cybersecurity Month, we're sharing some of our top security solutions including a few new faces. New Endpoint Security solutions Crowdstrike SentinelOne New SIEM & UEBA solutions LogRhythm Updated NAC solutions Fortinet FortiNAC (formerly...

Carolina Advanced Digital Earns ISO 20243 Certification for Supply Chain Security

Security: Top Twitter Influencers to Follow [Techopedia]

By Techopedia Staff, find VP of Engineering Jennifer Minella Takeaway: Stay on top of the latest news and views on cybersecurity by following these top influencers on Twitter. If there's one area of the tech industry that's undoubtly growing - and growing fast - it's...

Carolina Advanced Digital Earns ISO 20243 Certification for Supply Chain Security

Security: The Good, the Bad, and the Alternative [DarkMatters]

from Norse Security Dark Matters I began this third blog post by begging the question, “are women underrepresented and smacked down in the Infosec community?” With an industry that is dominated by men — I blatantly stated that I had heard both sides of the coin. From...

Carolina Advanced Digital Earns ISO 20243 Certification for Supply Chain Security

What Are the Most Overrated Security Technologies? [CSO Online]

from CSO Online   The security community has grown to depend on some basic technologies in the fight against cyber thieves, such as antivirus software and firewalls. But are practitioners clinging to tools that outlived their usefulness long ago? Were those tools...

Carolina Advanced Digital Earns ISO 20243 Certification for Supply Chain Security

Pen Testing: Dead in 2009 [CSO Online]

from CSO Online Does pen testing belong in the QA department? Fortify Co-Founder and Chief Scientist Brian Chess says 2009 will mark the end of pen tests as we know them. His theory is being met with resistance. ... Naturally, security practitioners who swear by pen...