How new public transportation technology is prioritizing passenger safety

Each year, Americans take billions of trips on buses, light rail, subways, trains and other public transit modalities. So it’s not surprising the recent Bipartisan Infrastructure Law earmarked $91 billion in guaranteed funding for public transportation, with priority areas of public safety, climate, transport equity and investing in new public transportation technology. Though traveling by public transportation is…

Empowering at-risk youth and adults with devices, connectivity and dignity

Portland Opportunities Industrial Center and Rosemary Anderson High School (POIC + RAHS) has a long name, but a simple, powerful mission: helping at-risk youth and adults be safe and successful. This thriving non-profit organization based in Portland, Oregon provides a diverse range of much-needed services, including alternative education, public safety and violence intervention, and job…

How to enhance and secure cloud communications between government agencies

The May 2021 release of Executive Order 14028, Improving the Nation’s Cybersecurity, the growing attack surface due to cloud adoption, and the January 2022 Federal Zero Trust memorandum have all added urgency to the federal government’s move to implement better network security through solutions based in Zero Trust architecture. With initiatives such as the Cloud Smart strategy and agencies like…

How Zero Trust is supposed to look

Over the last few years, it has become more and more apparent that the status quo for networking and security is no longer viable. Endlessly extending hub-and-spoke networks to more remote users, branch offices, and cloud apps increases risk, harms the user experience, and is prohibitively complex and expensive. The same is true when relying…

Righting the vessel

In 2019, advanced aquatic engine technology provider YANMAR Marine International was all at sea, or in a state of confusion. The company had outgrown its enterprise resource planning (ERP) system, with its legacy processes outdated and no longer supported.   The tech structure was largely manual, requiring employees to enter data in multiple places.  As a result, inputs were…

Fixed wireless access (FWA) is a secure networking option

When making decisions about network access, businesses need to be aware of and assess the security implications associated with network technology to help keep their digital assets protected. Cyber hygiene best practices include device security, cyber security education, and secure networking strategies. Businesses considering adopting fixed wireless access (FWA) solutions—whether over 4G LTE or 5G networks—should understand…

Secure cloud fabric: Enhancing data management and AI development for the federal government

In recent years, government agencies have increasingly turned to cloud computing to manage vast amounts of data and streamline operations. While cloud technology has many benefits, it also poses security risks, especially when it comes to protecting sensitive information. To address these challenges, agencies are turning to a secure cloud fabric that can ensure the…