|
Blog
|
Arrayainsight
|
Page
|
60

Theories Abound on Motive for Sony Pictures Hack

Arraya Insights| January 2, 2015

Right now there are nearly as many theories about who hacked Sony Pictures as there are people signing up at their local gyms to get started on those New Year’s resolutions. Even though the FBI is still steadfastly convinced North Korea’s fingerprints are all over the attack, another theory has been gaining steam lately. The […]

Read More >

Advancing Health IT Security and Interoperability: 3 Targets

Arraya Insights| December 30, 2014

Our recent posts on the U.S. Department of Health and Human Services’ Office of the National Coordinator for Health Information Technology’s “Federal Health IT Strategic Plan 2015-2020” have covered the scope of the plan and gone in depth on one of its top goals, namely, expanding the adoption of health IT. In this post, we’re […]

Read More >

Missed Upgrade Leads to JPMorgan Chase Cyber Attack

Arraya Insights| December 29, 2014

Your network security has been breached and your company’s sensitive data is in the hands of cyber crooks. That in and of itself is a bad enough spot to be in, but the salt in the wound? Hearing security experts say that a simple fix could have prevented the attack in the first place. It’s […]

Read More >

3 Ways the Feds are Hoping to Increase Healthcare IT Use

Arraya Insights| December 23, 2014

In our previous post on the U.S. Department of Health and Human Services’ Office of the National Coordinator for Health Information Technology’s “Federal Health IT Strategic Plan 2015-2020” we laid out the basics of the report and what it could mean for the future of healthcare IT. This time around, we’re going to focus on […]

Read More >

3 Challenges Which Can Stall or Derail Cloud Adoption

Arraya Insights| December 22, 2014

The road to cloud adoption has been well-traveled. IT leaders have rushed to embrace cloud tools for the agility and savings they can bring to their organizations. Despite all of that foot traffic, there are still plenty of bumps which companies will need to deal with. These bumps can keep longstanding cloud adopters from really […]

Read More >

What the Future Holds for Healthcare IT: Feds Lay Out Their Focus

Arraya Insights| December 17, 2014

What’s healthcare IT going to look like over the course of the next several years? Well, short of a crystal ball, a new plan compiled by the U.S. Department of Health and Human Services’ Office of the National Coordinator for Health Information Technology – in collaboration with more than 35 other agencies – is the […]

Read More >

Punishing Test Casts Doubt on Long-held SSD Beliefs

Arraya Insights| December 15, 2014

One of the knocks against solid-state drives (SSDs) was that, despite the higher level of performance they offered, they weren’t as durable as their counterparts, hard disk drive (HDD). As a result, the opinion prevailed that they just couldn’t be counted on. At least not for the long haul, anyway. There was always the fear […]

Read More >

New Releases From Cisco Ease Wide Area Network Complications

Arraya Insights| December 12, 2014

Rising user expectations. Concern over how applications perform. Rapidly advancing and changing security threats. The desire to balance operational simplicity with cost optimization. Sound familiar? They’re just a few of the headaches companies face with their branch office and wide area networks.   As organizations have expanded to cover more territory, these networks have become […]

Read More >

How the Cloud Could Change the Face of Company Data Centers

Arraya Insights| December 3, 2014

Experts are predicting data centers everywhere are about to be hit with a massive increase in the amount of work they’re expected to handle. Is yours going to be ready to manage all of that extra traffic? By 2018, global data center IP traffic is estimated to almost triple from where it stood back in […]

Read More >

New, Highly Advanced Digital Security Threat Uncovered

Arraya Insights| December 2, 2014

It’s been called “groundbreaking” and “almost peerless,” and it’s been lurking in the wilds of the cyber landscape undetected since at least 2008. It’s a piece of malware known as “Regin,” and it has thoroughly impressed – and baffled – hardened security experts since its recent discovery. The malware, which was first made public by […]

Read More >