Data Foundry Blog

An Overview of 2019 Technology Policy in the Texas Legislature

The Texas Legislature meets every odd-numbered year in the city of our headquarters – Austin. We are excited to track technology policy development in the 2019 session. We hope to see several bills pass that move our state forward in terms of keeping policy up to speed with innovation. This year we are particularly focused on bills submitted in the areas of stingray technology, drone surveillance and cybersecurity.

Read More

Why Data Provenance Could Be the Next Big Thing for Cybersecurity

certified authentic

Data provenance is the documentation of the origin of a data product or piece of content. Data provenance answers questions of where a particular piece of information came from, what tools were used to create it, and whether or not it was modified over time. This information is often stored in meta data and can be used to verify a data product’s authenticity.

Read More

2018: A Year in Review

It’s been an exciting year for us at Data Foundry. We opened our third data center in Austin, we’ve attended and sponsored some interesting events, and we’ve seen growth in some of our ancillary services. As we prepare for growth and change in 2019, we are looking back on events and milestones for the year.

Read More

9 Technology Trends and Predictions for 2019

technology trends 2019

It’s almost the end of another year, and predictions for 2019 tech trends are rolling in. Many of last year’s predictions rang true for 2018, including the rise of cybercrime-as-a-service, data sovereignty, and hybrid cloud connectivity. It looks like some exciting technologies will finally take off next year and become more commonplace, like augmented analytics, AI integration and edge computing. After analyzing predictions form Gartner, Forbes, Tech Republic and others, here are what we think will the top 9 predictions to watch out for in 2019.

Read More

7 DDoS Attack Trends Spotted in 2018

ddos attack trends 2018

As organizations and businesses increasingly rely on the Internet to conduct standard business operations and generate revenue, DDoS attacks (Distributed Denial of Service) are the obvious choice for malicious actors to disrupt the status quo, make a statement, and/or cause serious financial consequences for their targets. Each year, it has become easier for to hire third parties online to carry out attacks for a relatively low fee. These are some of the reasons DDoS attacks continue to increase year over year. As we are approaching the end of 2018, we’ve analyzed reports from leading DDoS mitigation providers to spot the top 7 DDoS trends over the last twelve months.

Read More

6 Healthcare Technology Trends and Their Impact on IT Infrastructure

healthcare technology trends

The future of healthcare is a smart one, where patients are more involved in their treatment plans, and they can consult with a healthcare professional from the comfort of their own homes. Doctors and nurses can monitor patients’ vital signs remotely, providing patients with more efficient treatment while reducing healthcare costs for an aging population. Here are six trends showing the impact of technology in healthcare and what it means for IT infrastructure and healthcare information management.

Read More

How to Get Ahead of Digital Disruption

digital disruption

Digital disruption makes businesses more competitive for many reasons, some of which include a reduction in the need for physical assets and materials and increased efficiency and agility. For example, Nest eliminated the need to have both an HVAC and security monitoring system, smart phones took the place of calculators, alarm clocks and cameras. These innovations disrupt entire industries because they are the obvious convenient choice for consumers. They also provide agility through scalable platforms that make it easy for companies to add and offer new services.

Read More

Data Foundry Hosts Houston 2 Open House Lunch

houston 2 data center exterior

On Thursday, October 25, we hosted an open house lunch in the technology briefing center at our Houston 2 data center on Greens Parkway. The event was a gathering of Data Foundry’s staff, founders, current customers, acquaintances and longtime colleagues in the IT and telecom industries.

Read More

It’s Time to Protect Our Industrial IoT: 9 Ways to Make a Difference

Industrial IoT image abstract

As some of you may already know, elections aren’t the only thing Russian hackers are meddling in. They’ve infiltrated our energy and manufacturing sectors as well. This year, the FBI and Department of Homeland Security announced Russian government actors have hacked into energy, nuclear, water and critical manufacturing sectors.  In July, they announced Russian hackers had infiltrated utility control rooms where they could have thrown switches if they chose to do so. Russia aside, it has become painfully obvious our industrial IoT (IIoT) and infrastructure are vulnerable.

Read More

National Cybersecurity Awareness Month – Protecting Your Hackable Home IoT

IoT home network with appliances

You may think your home’s smart devices only send data about temperatures or your exercise activities, so why does it really matter who sees it? Data in aggregate can reveal more than you think about yourself and your family, but even if privacy doesn’t matter to you, lack of data protection isn’t the only risk. Hackers can easily manipulate unsecured IoT-connected devices, get into your network and infiltrate other devices, such as your home computer. Every unsecured device you own is a potential inroad to your home network. Hackers can also take control of your devices and use them to conduct large-scale attacks on businesses and other organizations, such as was the case with the Mirai botnet. We all have a responsibility to improve our nation’s cybersecurity, and we can start with home network security.

Read More
Page 1 of 2112345...1020...Last »