mtooley

BEAD Funded Networks Performance Standards

Latency: The Key Metric for Broadband Performance Latency: The Key Metric for Broadband Performance Introduction Broadband connectivity has come a long way, surpassing the once-cherished metric of speed. With speeds reaching 1 Gigabit per second (Gbps) and beyond, latency has emerged as the true measure of broadband performance. In this…
Read More

A Deep Dive into NIST Security Controls and Executive Order 14028 for BEAD Grantees and Sub-Grantees

Introduction: In the realm of cybersecurity and supply chain risk management, compliance with industry standards is crucial. The Broadband Infrastructure Deployment Grants for American Digital Equity (BEAD) program places significant emphasis on these areas. To ensure the robust security of digital infrastructure, future BEAD sub-grantees must have a clear understanding…
Read More

Attesting Cybersecurity Compliance for BEAD

Attesting for regulatory compliance typically involves providing a statement or report that affirms that an organization or individual has met the requirements of a specific regulatory standard or framework. The process typically involves the following steps: Overall, attesting for regulatory compliance involves a thorough assessment of an organization’s operations to…
Read More

Cybersecurity Regulatory Requirements for ISPs

Internet Service Providers (ISPs) are responsible for providing internet access to their customers and handling their personal information. Due to the sensitive nature of this information, ISPs are subject to a range of cybersecurity regulatory requirements to ensure the protection of their customers’ data. The specific requirements may vary depending…
Read More

Fiber or Fixed Wireless?

As demand for high-speed internet continues to grow, internet service providers (ISPs) are exploring new technologies to deliver faster and more reliable internet connections to homes and businesses. Two of the most popular technologies currently in use are Fiber-to-the-Home (FTTH) and Fixed Wireless Access (FWA). In this blog post, we’ll…
Read More

Detecting Pirated Video

Detecting encrypted pirated streaming video on a network can be challenging because the encryption used by the streaming service and the pirated content can make it difficult to identify. However, there are several methods that can be used to detect encrypted pirated streaming video on a network, including: It is…
Read More

Using data analytics to optimize your network

In today’s world, where the internet is an essential part of our daily lives, having a high-quality broadband connection has become more important than ever. People use the internet for everything from work to entertainment, so having a stable and fast connection is essential. However, with the ever-increasing amount of…
Read More

Broadband Expansion with BEAD Grants

Access to high-speed broadband is becoming increasingly important for businesses, individuals, and communities across the United States. The COVID-19 pandemic has further highlighted the need for reliable and affordable broadband connectivity, as more people are working and learning from home. Fortunately, the Broadband Equity Access Deployment (BEAD) grant program provides…
Read More

NIST CSF Routing Security Profile

A NIST Cybersecurity Framework Profile for routing security would be designed to help organizations manage their network routing systems and protect them from cyber threats. Here are some of the key components that would be included in a NIST Cybersecurity Framework Profile for routing security: Overall, a NIST Cybersecurity Framework…
Read More

Solutions for Better Broadband

Stafford, VA 22554
703 321 6205