Join us for an insightful session as we delve into the world of Microsoft Surface devices and their transformative impact on Federal agencies and government sectors. This webinar is designed to help you understand how Surface devices are revolutionizing the government...
Transforming Federal Workspaces with Surface Hub 2S
Join us for a captivating session as we explore the transformative potential of Microsoft's Surface Hub 2S for Federal agencies and government sectors. This webinar is specially designed to showcase how Surface Hub 2S is reshaping the collaboration landscape in...
Meet the new Microsoft Surface Suite
Meet the Surface Family This is an important time for government, and being able to step up efficiently and effectively is critical. Do you have the tools you need? With so much shifting in government right now, I thought it might be helpful for you to see how others...
Meet the new Microsoft Surface Hub 2S for Federal
Bring Remote Teams Together Remote teamwork has never been easier with the light-weight, mobile Surface Hub 2S. Collaborate via Microsoft Teams, and stay engaged during meetings with a 4K+ quality screen and camera, along with enhanced speakers and mics. Take...
Meet the Microsoft Surface Products for Federal
Powerful versatilityWork the way you want with our ultra-light 2-in-1. Surface Pro 7+ is portable enough to take anywhere starting at just 1.7 pounds,1 yet powerful enough to handle all your business apps. Get intensive tasks done 2.1 times faster than before and...
How to Prepare for Cloud Security (Post-COVID)
You might not be able to see it, but it’s here. Lingering in the virtual cyber sphere lay containerized packets of information from sensitive data to music and photos. More and more organizations are migrating to the cloud if they haven’t done so already. The pandemic...
Game Face On: Getting Serious About Data Breaches
An August T-Mobile data breach affecting more than 53 million people including current, former and prospective customers is one of many recent cyber attacks to flood headlines. The breach led to two class action lawsuits filed by customers and accuses the company of...
Four Tools & Tips to Properly Secure Your Network
A recent report issued by a U.S. Senate Committee revealed that America’s data is in fact still at risk. Cybersecurity at eight federal agencies was found to be so poor that four of them earned grades of D, three got Cs, and only one received a B. The report also...
Lost in the Chaos: 3 Tips to Mitigate COVID-19 Security Challenges in Healthcare
Worldwide, we’ve taken many hits in the past year and a half. From the economy to healthcare and everything in between, COVID-19 has uprooted the daily lives and operations of people and organizations everywhere. Lost in the chaos of it all, there was IT security....
Carolina Advanced Digital Earns ISO 20243 Certification for Supply Chain Security
Raleigh, N.C. (November 13, 2020) – Carolina Advanced Digital, a nationally-recognized leader in technology infrastructure and security solutions, today announced it has achieved the ISO 20243 certification for supply chain security as part of the Open Trusted...
High Risks in Higher Education: 2021 Security Outlook
COVID-19 has changed nearly every aspect of our lives, not to mention the operations of entire industries. Think about it: what does your ‘new normal’ look like? For higher ed institutions, it consists of the rapid switch to online learning to ensure the physical...
New Tech Talk Video Podcast Series Q3 lineup
A love child of a video podcast and webinar, our new Tech Talk series will be sure to amaze and entertain. In these casual sessions, our engineering team will lead discussions on today’s top technology trends, answer client questions, and discuss solutions. Expect a...
3 Tips for Keeping Your Enterprise Safe in the Era of IoT
Do you ever stop to think about the rate at which the technology around us is evolving? Most people don’t. Technology is so ingrained into our everyday lives that the rapid digital transformation across entire industries goes unnoticed. Perhaps the most destructive,...
3 Steps to Manage Your Enterprise’s Digital Footprint
Think about how many things you touch each day. Whether it’s a door handle, a box at the grocery store or a simple handshake, your fingerprints are everywhere. Now think about your online activity. How many websites do you browse each day? What social platforms do you...
Post COVID-19: 4 Emerging New-Age Tech Security Challenges
If you’re like the majority of the world’s population, you’re probably cooped up in your home, wondering when life will return to normal. We hate to break it to you, but the new ‘normal’ won’t be so normal. The virtual workforce explosion has not only altered our...
How to Properly Support Your CISOs and IT Staff
What’s tech-savvy, focused and brings business success full circle? You guessed it— CISOs. CISOs and IT leaders are vital to the success of every organization. They’re the key orchestrators of an organization’s security performance and ensure that information assets...
4 Easy Connectivity Options for a Remote Workforce- COVID-19 Response
Right now, many of our clients are looking for ways to support a suddenly remote workforce, as the impact of COVID-19 ripples through the U.S. There are several ways your organization can support a remote workforce, and here we share a few common options along with...
Tech Q&A: Will my current infrastructure support client VPNs?
With the onset of the COVID-19 pandemic, many organizations are asking some variation of the question “will my infrastructure support remote access for my employees”. This is evident by the fact that VPN usage in the U.S. grew by 53% between March 9th and 15th...
5 Technical Recommendations for COVID-19 and Pandemic Preparation
We asked the engineering team what customers should be considering during the time of COVID-19 and other pandemic or natural disasters. Be aware of phishing emails Phishing emails and malicious activity increase during times of crisis. Attackers are opportunistic, so...
Preparing the Talent Pipeline in Cybersecurity: Carolina Advanced Digital & the Black Falcons
Cybersecurity is one of the nation’s top industries lacking skilled employees. While digital transformation widens the skills gap, our industry constantly faces setbacks as those entering the field lack the skills needed to keep up with new technologies. To bridge...
3 Ways to Measure the Effectiveness of Your Cybersecurity Program
No one thinks they’re at risk of being targeted until it’s too late. A security attack can wreak havoc on any individual or company, causing potential legal, financial and operational disturbance. With more emerging security threats on the horizon than ever before,...
The Best of Both Worlds: Data Privacy Regulations and Enhanced Security Postures
For years, European data privacy laws have eclipsed those in the U.S., but the tides may be changing. To safeguard the increasing amounts of digital data, policy makers in the U.S. are focused on adopting stringent regulations to push the data privacy initiative....
Emerging Security Threats: Defending Your Organization from Deepfake Technology
Following Facebook’s recent decision to ban deepfake technology from its social platform, many other social media companies are following suit, cracking down on what Mark Zuckerberg has called an “emerging threat.” Deepfake has quickly transcended from YouTube and...
Iran Cyber-Response: 4 Recommendations for Defending Your Organization from Nation-State Attacks
Forceful revenge said to follow in response to a recent U.S. airstrike, resulting in the death of Iran’s top general Qassem Soleimani, is predicted to disrupt our lives in unprecedented ways. The cybersecurity threats facing the U.S. range from widespread economic and...
How Smart is IoT Device Security? Continuous inventory, monitoring, and security for enterprise IoT
Consumers have fallen in love with smart devices and effortless connectivity. If you own devices like Amazon Alexa or Google Assistant, chances are you’ve fallen down the IoT rabbit hole. IoT-enabled devices allow both technical and non-technical consumers of...
Free Cyber Threat Assessment Offer- Security, Productivity, Performance
Gauge Your Current Security, Productivity and Performance at No Cost Carolina Advanced Digital, in conjunction with partner Fortinet, will be conducting Cyber Threat Assessments for customers. Assessments are being offered at no cost for a limited time and include...
The Weak Link in Cloud Security
The popularity of cloud computing has continued to rise with the emergence of digital transformation initiatives. Whether it public, private or hybrid, cloud architecture offers cost-effective and scalable computing power. While cloud computing is more secure than...
A New Era of Security: Passwordless Authentication
Passwords were created to block unwanted users from accessing systems and networks. Today, they have become the weakest link in cybersecurity. As hackers continue to compromise the personal data of millions worldwide, an examination of major breaches has revealed the...
Jennifer Minella Ranks #4 in Security Thought Leadership
Our VP of Engineering & Security is dominating 2019. This year alone, Jennifer Minella has been featured in Cyber Ventures “Women Know Cyber: 100 Fascinating Females Fighting Cybercrime” and spoken at industry-leading events including the RSA Conference and the...
The Impact of 5G in Cybersecurity
Everyone wants 5G, and the hype surrounding its launch only continues to grow. Wireless providers have promised that the 5G rollout will bring faster speeds, instantaneous communication and global interconnectivity. This next generation of wireless connectivity is...
Building a Security-Centric Culture in a Digital Age
Cyber is here, there and everywhere in between. As our technology-dependent world grows, consumers and organizations alike are eager to adopt the latest innovations. Digital transformation has many people focused on IoT, SD-WAN and the cloud while the topic of...
Demystifying Artificial Intelligence (AI)
Artificial intelligence (AI), one of many double-edged swords in technology, is expected to incite both positive and negative impacts on people and industries worldwide. It’s constantly evolving and as technological advancements emerge, these changes are leading many...
Advanced Persistent Threats | Know Them & Stop Them
Advanced persistent threat (APT) attackers are the top attackers of the cyber chain. Sounds scary, right? What’s worse is that these groups can steal your organization’s data and navigate its network without ever being noticed. APT is a broad term used to describe an...
Celebrating Our Top Cyber Security Solutions
Since it's National Cybersecurity Month, we're sharing some of our top security solutions including a few new faces. New Endpoint Security solutions Crowdstrike SentinelOne New SIEM & UEBA solutions LogRhythm Updated NAC solutions Fortinet FortiNAC (formerly...
Carolina Advanced Digital Announces Two Exclusive IT Conversation Events with Jennifer Minella Designed to Help CIOs and CISOs Lead Successful Mobile Implementations
'The Savvy CIO's Guide to Planning a Mobile-First Enterprise' comes to Charlotte on Tuesday March 29 and Raleigh on Thursday March 31. Registration is now open to industry professionals to participate in a discussion that will explore how today's enterprises can most...
Free 1-day events across North Carolina on Secure Networking and Mobility technologies with HP, Aruba, and Carolina Advanced Digital
Get a first look at the latest in secure networking and mobility technologies from Gartner quadrant-leader HP and Aruba. These one-day events hosted by Carolina Advanced Digital and HP give attendees a glimpse of what's new and upcoming in the world of networking,...
WHOIS: Jennifer Minella, VP of Engineering and Consulting CISO at Carolina Advanced Digital [Cisco OpenDNS]
"For this month’s WHOIS, we sat down with Jennifer Minella, VP of Engineering and Consulting CISO at Carolina Advanced Digital, to talk about security, mindfulness, certs, and the Emoticons Technology Club." WHOIS: Jennifer Minella, VP of Engineering and Consulting...
Carolina Advanced Digital and Fortinet Launch Partnership to Provide Industry Leading Network Security Solutions for Enterprise-class Customers
FOR IMMEDIATE RELEASE ### Carolina Advanced Digital and Fortinet Launch Partnership to Provide Industry Leading Network Security Solutions for Enterprise-class Customers The two security solutions leaders will collaborate on a range of projects, including a focus on...
Security: Top Twitter Influencers to Follow [Techopedia]
By Techopedia Staff, find VP of Engineering Jennifer Minella Takeaway: Stay on top of the latest news and views on cybersecurity by following these top influencers on Twitter. If there's one area of the tech industry that's undoubtly growing - and growing fast - it's...
Security: The Good, the Bad, and the Alternative [DarkMatters]
from Norse Security Dark Matters I began this third blog post by begging the question, “are women underrepresented and smacked down in the Infosec community?” With an industry that is dominated by men — I blatantly stated that I had heard both sides of the coin. From...
Carolina Advanced Digital, Inc. Announces 11th Annual IT Hot Topics Conference
Carolina Advanced Digital, Inc. (CAD), an engineering company focused on IT infrastructure, management and security solutions, announced their 11th annual IT Hot Topics Conference will take place May 8th-10th,2013 at the Grandover Resort in Greensboro, NC. This free...
Grassroots efforts, Carolina Advanced Digital sponsors BSides Greensboro
When: Wednesday, March 9th, 2011 Where: Natty Greene's Loft, Greensboro, NC
What Are the Most Overrated Security Technologies? [CSO Online]
from CSO Online The security community has grown to depend on some basic technologies in the fight against cyber thieves, such as antivirus software and firewalls. But are practitioners clinging to tools that outlived their usefulness long ago? Were those tools...
Pen Testing: Dead in 2009 [CSO Online]
from CSO Online Does pen testing belong in the QA department? Fortify Co-Founder and Chief Scientist Brian Chess says 2009 will mark the end of pen tests as we know them. His theory is being met with resistance. ... Naturally, security practitioners who swear by pen...