CRITICAL INFRASTRUCTURE PROTECTION

June 25, 2019

The memorandum of understanding (MOU) Annex signed by the Transportation Security Administration (TSA) and Pipeline and Hazardous Materials Safety Administration (PHMSA) in 2006 delineates their mutually agreed-upon roles and responsibilities for pipeline security, but has not been reviewed to consider pipeline security developments since its inception. As a result, the annex may not fully reflect the agencies’ pipeline security and safety-related activities.

Spotlight

Offensive Security

Offensive Security is the leading provider of online penetration testing training and certification for information security professionals. Created by the founders of Kali Linux, Offensive Security offers a unique mix of practical, hands-on training, performance-based certification programs, virtual lab access, and very successful open source projects. These offerings work together to provide practitioners with a one-of-a-kind opportunity to develop the highly sought-after skills that will advance their careers and better protect their organizations. Additionally, Offensive Security is committed to funding and growing Kali Linux, the leading operating system for penetration testing, ethical hacking and network security assessments

OTHER WHITEPAPERS
news image

NetApp HCI with Cisco ACI : NetApp HCI Solutions

whitePaper | September 30, 2022

Cisco Application Centric Infrastructure (Cisco ACI) is an industry-leading, secure, open, and comprehensive Software-Defined Networking (SDN) solution. Cisco ACI radically simplifies, optimizes, and accelerates infrastructure deployment and governance, and it expedites the application deployment lifecycle.

Read More
news image

IT@Intel: Data Center Strategy Leading Intel’s Business Transformation

whitePaper | November 4, 2022

Intel IT runs Intel data center services like a factory, affecting change in a disciplined manner and applying breakthrough technologies, solutions, and processes. This enables us to optimally meet Intel’s business requirements while providing our internal customers with effective data center infrastructure capabilities and innovative business services.

Read More
news image

Networking for the unforeseeable future

whitePaper | February 23, 2022

When it was introduced, MPLS was an ideal option for organizations that ran multiple business-critical applications at multiple locations. Operated and managed by a single carrier, MPLS converges voice and data traffic over connections that are isolated from the public Internet, while offering rudimentary control over applications.

Read More
news image

Top 5 Things to Ask Your Data Center About Compliance

whitePaper | January 14, 2020

Choosing the right colocation partner is critical, especially when it comes to compliance. When you’re outsourcing your data center needs, understanding your colocation provider’s compliance, security, availability and integrity are of upmost importance. A colocation provider mitigates risk through physical and environmental controls from an operational and security standpoint. Ensuring proper maintenance and operation of critical infrastructure, along with upkeep and continual improvement of a physical security program, are part of a comprehensive compliance program. This new report from Iron Mountain provides details on what the company sees as five of the top things to ask your data center provider about compliance:

Read More
news image

The Gorilla Guide to Converged Infrastructure

whitePaper | January 7, 2020

Discover the Power of Converged Infrastructure and learn how Converged and Hyperconverged Infrastructure Compare and Contrast. The more automated the delivery of the right storage to the right data, and the delivery of the right protection, preservation and privacy services to the right data, the more appropriate the infrastructure option is. This was supposedly what the storage vendors were working on when the SAN world was disrupted by the virtual server crowd. Converged Infrastructure is intent on returning us to that course. The purpose of this guide is to provide the IT planner or server administrator with background information that will assist them as they consider alternatives for hosting their mission-critical workloads and their data.

Read More
news image

Modernizing Agriculture Data Infrastructure to Improve Economic and Ecological Outcomes

whitePaper | May 17, 2022

Modernizing U.S. agricultural data infrastructure will better equip farmers and the U.S. Department of Agriculture (USDA) with tools to adapt, innovate, and ensure a food-secure future given the increasingly dynamic conditions in which the sector operates.

Read More

Spotlight

Offensive Security

Offensive Security is the leading provider of online penetration testing training and certification for information security professionals. Created by the founders of Kali Linux, Offensive Security offers a unique mix of practical, hands-on training, performance-based certification programs, virtual lab access, and very successful open source projects. These offerings work together to provide practitioners with a one-of-a-kind opportunity to develop the highly sought-after skills that will advance their careers and better protect their organizations. Additionally, Offensive Security is committed to funding and growing Kali Linux, the leading operating system for penetration testing, ethical hacking and network security assessments

Events