Hosted Collaboration Solutions for Government (HCS-G).

Iron Bow’s HCS-G, powered by Cisco, is a FedRAMP Authorized cloud-based collaboration service built to help you improve communication capabilities, empower your mobile workforce, meet cloud-first mandates and maintain stringent security standards. Check out this video and see how we can help your agency overcome key IT and business challenges.

See what VDI can do for your agency.

The case for Virtual Desktop Infrastructure (VDI) has never been stronger. Agencies are looking for better approaches to securing and managing end-user devices. Check out this infographic and see what’s driving the interest in VDI solutions—and what concerns are slowing agencies down.

@Iron_Bow
About TechSource

Welcome to Iron Bow's TechSource, a blog about the issues facing the government and industry today and the technologies being adopted to help overcome them.

Category: Cyber Security


Industry Must Step Up to Help Secure DoD Technology

More than any other agency in the federal government, the Department of Defense (DoD) faces incredible challenges when it comes to cyber security. The problem: our warfighters should be able to use the most cutting-edge technology, but they need to make sure systems and devices are protected against bad actors and nation states. In February, […]

Keep Reading

Rob Chee

May 7, 2019

Cyber Security

What Did 2018 Teach Us About Cyber Security?

Cyberattacks in 2018 ran the gamut. We saw threats hiding out in compromised systems to steal computing power and information, and we saw them on an international stage, taking down the opening ceremony of the Olympic Games. Some of last year’s most impactful cyber threats, as outlined in Cisco’s February 2019 Threat Report, offer us […]

Keep Reading

Rob Chee

April 23, 2019

Cyber Security

Tech Trends 2019: Software-Defined Everything, Collaboration and Security

In 2019, agencies will be looking for efficiency and flexibility as they take the next step in modernizing their IT infrastructure. While previous years have seen the federal government warm up to digital transformation, this year it will begin to reap the benefits of those investments, making it easier for federal employees to collaborate and communicate […]

Keep Reading

Jim Smid

Agencies Need Continuous, Automated Monitoring to Tackle Future DNS Attacks

In late January, the Department of Homeland Security (DHS) issued an emergency directive to mitigate the effects of a domain name system (DNS) hijacking campaign. DHS’ Cybersecurity and Infrastructure Security Agency noted in a letter to agencies that it was aware of multiple executive-branch domains targeted by the attacks, which redirected and intercepted web and […]

Keep Reading

Rob Chee

March 15, 2019

Cyber Security

How Standardizing RMF Will Create Value for the Military

Imagine you work at a manufacturing company. The company is divided into four separate divisions that produce different products, using the same equipment. The CEO develops a set of controls to make sure that each piece of equipment used in manufacturing products is safe and efficient. One division decides to modernize its processes before the […]

Keep Reading

Brent White

January 3, 2019

Cyber Security  •  Networking

Automation: Redefining Cyber Protection

According to Gartner’s Innovation Insight for Security Orchestration, Automation and Response report, organizations struggle to keep up with the vast number of new cyber security attacks because they’re too often utilizing manual processes to combat breaches. In the United States alone, cyber security incidents skyrocketed over the last five years. In 2012, about 419 million […]

Keep Reading

Ryan Wolfe

November 26, 2018

Cyber Security

AI Will Power the Future—Are You Ready?

By 2019, 40 percent of all digital transformation initiatives will be enabled by AI. AI is already a part of most people’s daily lives; from dynamically pricing Uber trips and making Google maps route decisions to tagging friends on Facebook and setting FICO scores to determine our credit worthiness. While there are many applications of […]

Keep Reading

Steve Heibein

October 23, 2018

Big Data & Analytics  •  Cyber Security

RMF and the Evolution of Cyber Security Frameworks

Government cyber security regulation isn’t new, but it is constantly changing. Nearly a decade after the first relatively static cyber security standards were introduced in 2006, the National Institute of Standards and Technology (NIST) set out to develop a continuous process for networks security with the Department of Defense  (DoD) Information Assurance Certification and Accreditation […]

Keep Reading

Rob Chee

October 18, 2018

Cyber Security  •  IT Modernization

Don’t Ignore the Cryptominer in the Coalmine: What You Need to Know About the Biggest Cyber Threat Trend of 2018

While the market value of cryptocurrencies has recently experienced a downturn, there’s no denying its exponential growth, peaking at over $700 billion in early 2018. While investors have seen the value in cryptocurrency, so have bad actors and cyber criminals looking to take advantage of this emerging trend. Cryptomining attacks are relatively lucrative, simple to […]

Keep Reading

Rob Chee

October 16, 2018

Cyber Security

Transforming Legacy Systems: Where Cloud and Processing Power Intersect

The “Journey to the Cloud” describes a wholesale shift in the technology, operation, and administration of the modern data, in ways not seen since server architectures were fundamentally redrawn with the introduction of the microcomputer, in the 1980s. This change means that the traditional three tier data center era, of separately managed server, storage and […]

Keep Reading

Jason Lamb

September 12, 2018

Cloud  •  Collaboration  •  Cyber Security  •  Data Center

Printers: The Overlooked Entryway Into Your Network

Computers, smartphones and tablets—we know these devices are susceptible to cyber attacks and, as a result, take incredible caution to lock them down and cordon them off from cyber criminals. But have you also considered that large device that whirs and flashes as it scans, copies and prints valuable internal information? Your printer is also […]

Keep Reading

Michael Howard

August 20, 2018

Cyber Security

Protecting Government Data in the Age of Ransomware

According to a February report by Dell Technologies and Secureworks, cyber security researchers saw 200 new ransomware variants in 2016—a 122 percent increase from the previous year. Ransomware sent out by a malicious actor infects a user’s device and encrypts their data. The attacker then threatens to block access to the data unless a ransom is paid. […]

Keep Reading

Emmett Kaczmarek

August 8, 2018

Cyber Security

Connectivity is Key: Three Takeaways from Cisco Live 2018

Emerging technologies are redefining what’s possible for government. Not just the technologies themselves, but also their interconnected capabilities and the analytics they can provide. Collaboration and connectedness emerged as the central themes during this year’s annual Cisco Live in Orlando. Attendees got a look into how connected tech can enable organizations, including federal agencies, to […]

Keep Reading

Josh Finke

July 5, 2018

Collaboration  •  Cyber Security  •  Managed Services