tag >> f5-networks
October 20th, 2016
Over the past decade, technology has become an integral part of the classroom and learning experience. Instructors and students both rely on computers and Internet connectivity to teach, research, and learn. Many school computers are protected with access restrictions and anti-virus software, however the Internet connectivity of these devices has been left widely unmanaged. The results? Schools across the nation are facing interruptions to instruction at an alarming rate through Distributed Denial of Service (DDoS) attacks.
July 29th, 2016
It’s no secret that security incidents involving federal systems have been on the rise over the past few years, but the actual numbers are staggering. Between September 2014 and June 2015, there were 30 million attacks – that’s 1,000 attacks each day.
June 7th, 2016
Adding to this paradox, agencies are rapidly migrating to the cloud to become more flexible and reliable while cutting capital costs. With data stored in hybrid and private cloud environments, security is again transforming. In light of these changes, it can become a real temptation to take “trust no one” at its face value and lock down all content.
May 17th, 2016
This month’s focus in Carahsoft’s Innovation in Government series, in collaboration with Government Computer News, focuses on “Securing the Enterprise.” Security has been difficult for enterprises of all kinds, both public and private, to deal with because it is a journey, not a destination. The thought leaders included in this month’s feature can offer you a lot of technical knowledge and advice to make the journey easier.
- Adobe, F5, F5 Networks, Government Cybersecurity, HyTrust, Innovation in Government, Qlik, Red Hat, Splunk, VMware
March 3rd, 2016
The 2016 Mobile World Congress revealed some powerful insights on what matters in mobile security. The focus of this year’s show was not the devices, but the network they run on.
March 2nd, 2016
Today’s data center is ever-evolving and integrates with a widely interconnected and increasingly virtual IT infrastructure. Users today are innovating in their data centers with the use of applied technology. Check out these 6 ways data centers are becoming more agile and secure.
February 9th, 2016
At our 2015 Cyber Playbook event, a number of government and industry speakers discussed the vulnerabilities around Domain Name System (DNS), pointing to it as a key topic for IT teams in 2016. Even though DNS breaches have been on the rise over the past few years, many agencies aren’t even aware that their DNS needs protecting.
December 2nd, 2015
It should come as no surprise that today’s workforce is changing with mobile devices infiltrating the workplace and employees exploring opportunities for mobility. In government, it’s more important than ever to address the changing mobile environment, build secure BYOD programs, and learn how to adjust and improve mobile programs already in place to fully meet agency missions and initiatives, as well as maximize productivity and lower budget costs.
- Adobe, F5 Networks, Good Technology, Lookout, Mobile Government, Mobility, Precise Biometrics, Red Hat
November 5th, 2015
What are we to do when the bad guys use our own technology against us? This is what’s happening everyday as bad actors use the data routes we use - email, applications, data traffic, and more - to get into our systems.