Why and How to Shed Light on Your Agency’s Dark Data

“Dark data” – by that we mean data that’s been stored away in some IT system and untouched for years, is about to come out of the shadows.

Thanks to big data technologies it’s become easier than ever to extract new business value from information assets that haven been collected, processed and stored away (either because they’d served their purpose or were required to be kept for compliance reasons).

Not using, analyzing, or even accessing that data not only inflates storage costs, it could also leave that data vulnerable to the mismanagement of sensitive data.

The Anatomy of a Cyber Attack on Government Systems

With fewer resources than the private sector, yet faced with the same threats, the U.S. government is dealing with a complex dilemma. Both the public and government employees demand accountability for data breaches, but few understand the challenges that federal CIOs face – hiring and keeping specialized talent, paying for the hardware and software, and keeping pace with changing political agendas.

6 Clues Left by Hackers that Can Help Agencies Defend Against Attacks

In the wake of the recent announcement of a massive data breach at the federal government’s Office of Personnel Management (OPM), blame was quickly laid at the door of state-sponsored Chinese hackers (although U.S. officials fell short of an all-out accusation).

While China denies any involvement, cybersecurity analysts suggest that the breach carried all the hallmarks of a state-sponsored attack, such as evidence of highly organized teams that focus on the same targets, often for years, and outside of regular hours.

Veritas Volume Replicator (VVR) Status Script

The Veritas Volume Replicator (VVR) Option provides organizations with a foundation for continuous data replication, enabling rapid and reliable recovery of critical applications at remote recovery sites. As an option to Veritas Storage Foundation by Symantec, Volume Replicator enables efficient replication of data over IP networks, giving organizations an extremely flexible, high-performance alternative to traditional array-based replication architectures.