VIRTUALIZATION: What is Microsegmentation? How Getting Granular Improves Network Security. Microsegmentation is a way to create secure zones in data centers and cloud deployments that allow you to isolate workloads and protect them individually. Read more
CLOUD: Defense Department’s Secret Weapon for Network Security. Lessons civilians—or other organizations—can learn from how the military approaches cybersecurity. Read more
OPINION: Blurred Lines Between Networking and Security. Not so long ago, networking and security were largely separate entities. Traditionally, networks were constructed on standard building blocks such as switches and routers and security solutions such as perimeter firewalls or intrusion prevention systems applied afterwards. Each had its own set of tools, strategic approaches and dedicated operational teams. IT security departments typically focused on the delivery of time-honored threat detection methods and perimeter-based security defense mechanisms, as well as incident response and remediation. Networking teams spent time on issues around latency, reliability and bandwidth. However, the move to hybrid networks means traditional approaches cannot cope with the scale, automation requirements or the rate of change. So what are the reasons for this evolution? Read more.
FEDERAL GOVERNMENT: Proposal for Federal Wireless Network Shows Fear of China. Today’s mobile networks are known as “4G” networks because they are the fourth generation of wireless technologies. Carriers are already planning “5G” networks. But a presentation and memo by the National Security Council disclosed by Axios proposes that the government build a nationalized 5G network out of fears of falling behind China both economically and militarily. Read more.
NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems February 2018 https://www.slideshare.net/BMDS3416/tech-update-summary-from-blue-mountain-data-systems-february-2018.
IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.
BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.