Blog

Blue Ridge Networks Receives Two Honors for Industry Excellence  

November 28, 2018

Blue Ridge Networks Receives Two Honors for Industry Excellence  

The Blue Ridge Networks team is pleased to share that it has recently been the recipient of two prestigious awards for its work in cybersecurity. Most recently, during ISC East, our LinkGuard platform was named the Silver Award Winner for “Best Cyber Critical Infrastructure Solution,” in the 2018 ‘ASTORS’ Homeland Security Awards. This annual awards […]

LinkGuard Recognized as ‘Best IoT Hardware Security’ Winner in 2018 IoT Innovator Awards

October 2, 2018

LinkGuard Recognized as ‘Best IoT Hardware Security’ Winner in 2018 IoT Innovator Awards

Blue Ridge Networks is excited to share that its LinkGuard platform has been selected as a Bronze Award Winner for “Best IoT Hardware” in the 2018 IoT Innovator Awards. This competitive awards program, run by IoT Innovator, recognizes excellence in a wide range of areas concerning the Internet of Things (IoT) and was designed to […]

The OT and IT Tug of War

October 1, 2018

The OT and IT Tug of War

There was a time when OT (operational technology) and IT (information technology) departments operated in silos. Both groups would go about their individual business operations, without any crossover. Today, the growth of IIoT and network-connected OT systems have forced OT and IT to operate collaboratively in order to keep the business operating efficiently, creating a […]

When Evaluating Cyber Solutions, Connections Matter

September 25, 2018

When Evaluating Cyber Solutions, Connections Matter

In our last blog, Your Cybersecurity Vendor of Choice Shouldn’t Rock the Boat, we outlined key questions to ask a cybersecurity vendor before you jump into a partnership. Let’s continue that discussion and focus on additional evaluation criteria to help guide your search. Regardless of the industry you’re in, your infrastructure is mission-critical to your […]

Your Cybersecurity Vendor of Choice Shouldn’t Rock the Boat: Three Key Questions to Ask Your Cybersecurity Partner

August 15, 2018

Your Cybersecurity Vendor of Choice Shouldn’t Rock the Boat: Three Key Questions to Ask Your Cybersecurity Partner

If you’re responsible for maintaining the integrity of mission-critical infrastructure, such as communications networks, power grids, first responder services or transportation networks, you know that keeping systems safe is of vital importance, as these networks are imperative to upholding public safety and our economy. But, regardless of the industry you’re in, the increasingly complex and […]

Blue Ridge Networks Chairman and CEO Interviewed on Federal News Radio, Talks Zero Trust, Cybersecurity, and Autonomous Network Segmentation

August 1, 2018

Blue Ridge Networks Chairman and CEO Interviewed on Federal News Radio, Talks Zero Trust, Cybersecurity, and Autonomous Network Segmentation

This month, Blue Ridge’s Chairman and CEO John Higginbotham was a guest on Federal Tech Talk, a Federal News Radio segment on WFED 1500 AM, hosted by industry veteran John Gilroy. Once a week, Gilroy is joined with experts from both the public and private sectors to discuss the IT trends and challenges faced by […]

Taking a Zero Trust Stance Against Ransomware

July 16, 2018

Taking a Zero Trust Stance Against Ransomware

Welcome to part two of our blog series about the evolving ransomware threats facing government agencies. If you missed it, check out part one: The Ransomware Riddle: The Growing Threat Government Agencies are Trying to Solve, where we address why agencies are a bullseye for these growing attacks and protection is so challenging. The good […]

The Ransomware Riddle: The Growing Threat Government Agencies are Trying to Solve

June 26, 2018

The Ransomware Riddle: The Growing Threat Government Agencies are Trying to Solve

Government agencies are on high alert as ransomware attacks are on the rise. While all organizations are potential targets, the government sector is particularly vulnerable. We’ve seen state, local and municipal agencies’ operations brought to a grinding halt, with attackers aiming to lock up victims’ most valuable data and be as disruptive as possible. What […]

How Cyber Threats in Healthcare are Evolving – And What to Do About It

May 17, 2018

How Cyber Threats in Healthcare are Evolving – And What to Do About It

Historically, cybersecurity practices in the healthcare industry have revolved mainly around securing medical records and ensuring patient privacy. However, the increasing reliance on operational technology (OT) throughout hospitals and healthcare networks has caused an evolution in cyberattacks. The uptick in interconnected devices in the medical field has created tremendous benefits for patient care, diagnosis and […]

Cybersecurity Defense in Depth: Archers Alone Won’t Defend the Castle

May 3, 2018

Cybersecurity Defense in Depth: Archers Alone Won’t Defend the Castle

The universal increase of interconnected devices has created virtually limitless opportunities for innovation and efficiency in almost every industry. However, it has also given hackers hundreds of thousands of new entry-points for attack. Unfortunately, there is no silver bullet – no one-size-fits-all solution that will completely protect your infrastructure against these kinds of threats and […]

Making Micro-Segmentation a Reality for IIoT Environments

April 10, 2018

Making Micro-Segmentation a Reality for IIoT Environments

Micro-segmentation enhances the efficiency of a security network by reducing the number of nodes to just two – a switch and a computer. This concept of point-to-point security with only two nodes in a network is the ultimate cybersecurity strategy which dates back to the 1960’s, and recently SDN has made it possible for modern […]

Why a VPN Is Not Enough for Secure Remote Access

March 8, 2018

Why a VPN Is Not Enough for Secure Remote Access

Cybersecurity Ventures predicts there will be 6 billion internet users by 2022 (75% of the projected world population of 8 billion) — and more than 7.5 billion internet users by 2030. VPNs have been around nearly as long as the internet, earning their keep as a means of connecting remotely to a private network over […]

Blue Ridge Networks Honored as a 2018 Top 10 Security Solutions Provider

March 5, 2018

Blue Ridge Networks Honored as a 2018 Top 10 Security Solutions Provider

Blue Ridge Networks was recently recognized by Government CIO Outlook as one of the Top 10 Security Solutions Providers in 2018. Other Companies named included Check Point Software Technologies, CyberRisk Solutions, Duo Security, Juniper Networks, PM America, StellarPeak Corp., Symantec Corporation, Synack, and Trend Micro. The annual list released by Government CIO Outlook was created […]

How to Improve Network Security by Breaking It Apart

February 22, 2018

How to Improve Network Security by Breaking It Apart

“If it ain’t broke, don’t fix it.” Despite the continued acceleration of cybercrimes, a shocking number of organizations take this line of thinking when it comes to cybersecurity. If you have been lucky enough to remain unscathed from the latest wave of sophisticated cyberattacks, you probably assume that your existing security technology is working just […]

BorderGuard Suite Selected as Finalist in 2018 Cybersecurity Excellence Awards

February 20, 2018

BorderGuard Suite Selected as Finalist in 2018 Cybersecurity Excellence Awards

The Blue Ridge Networks team is pleased to announce that our BorderGuard suite of products has been selected as a finalist in the Network Security category of the 2018 Cybersecurity Excellence Awards, an annual awards program recognizing excellence, innovation and leadership in information security. The awards are highly competitive within the cyber community. This year […]

Are You Protected from Spectre and Meltdown Processor Vulnerabilities?

February 1, 2018

Are You Protected from Spectre and Meltdown Processor Vulnerabilities?

Another week, another security vulnerability in the headlines. This one is especially bad and extremely widespread. Meltdown and Spectre leverage flaws in processors from Intel, AMD, and ARM-licensed processors that enable a variety of sophisticated cyber-attacks. For these vulnerabilities to be exploited, an attacker must be able to load or construct a specific sequence of […]