How to modernize to the cloud: A Census Case History

How to modernize to the cloud: A Census Case History

Date: June 3, 2021

The 2020 Census went online for the first time ever without a single second of downtime and zero hacks. T-Rex helped contribute to this success as the Technical Integrator. T-Rex’s Chief Technology & Innovation Officer Jason Keplinger and Chief Engineer Utpal Amin were interviewed by Tom Temin from Federal News Network. Learn how T-Rex helped the Census Bureau move mission-critical applications to the Cloud and the basic steps any IT shop can take to achieve enterprise modernization.

Listen to the full interview here.


recently posted
What is Zero Trust and Why Do I Need It?

What is Zero Trust and Why Do I Need It?

The traditional approach to cybersecurity focuses on building  walls to keep out bad actors. This was known as the perimeter and defense in depth models, which worked in the early days of the Internet, but are no longer sufficient for […]

Colonial Pipeline: Ransomware Is Not Slowing Down

Colonial Pipeline: Ransomware Is Not Slowing Down

Colonial Pipeline Company — one of the nation’s largest pipeline operators, supplying fuel across a 5,500-mile distance from Texas to New York — was recently attacked by ransomware. The ransomware attack forced Colonial Pipeline to shut down its systems and […]

Modern Cybersecurity: Modern Resilience

Modern Cybersecurity: Modern Resilience

Cyber resiliency is the ability to maintain mission assurance despite being faced with adversity via cyber threats. It is critical to incorporate it at all levels of your organization, from mission or business function level to organizational level, sector level […]

What We Can Learn from the SolarWinds Breach

What We Can Learn from the SolarWinds Breach

The SolarWinds breach in December 2020 demonstrates the importance of having a fortified cybersecurity approach to protect data. SolarWinds, a US-based software company, was hacked late last year. This breach remained undetected until early 2021. The supply chain attack introduced […]