October 31, 2018
DLT Chief Technology Officer Discusses Company’s Evolution to a Solutions Aggregator premium
Last month, we sat down with DLT Chief Technology Officer David Blankenhorn to get his insight on DLT’s evolution to a government solutions aggregator. Tell me a little bit about DLT’s movement to an aggregator model. Why is that important? Well to start, I look at it more along the lines of a natural evolution. […]
premium
DLT Solutions
October 31, 2018
AWS Insight: The Role of the Cloud in Powering U.S. Elections premium
Choice and self-determination are cornerstones of our nation’s democratic process. Come election night, we might not all root for the same candidates, but there’s one point we can all rally around – the need for modernization and the role of the cloud in powering U.S. elections. Elections administrators, political campaigns, and civic organizations are faced […]
premium
brandon.norris@dlt.com'
October 29, 2018
Government Cloud Computing Gets Renewed Emphasis premium
The Obama and Trump administrations may not have a lot in common. But encouraging federal agencies to move their computing workloads to cloud services providers has been a definite point of policy continuity. Recall that during the Obama years, cloud and a fresh data center consolidation initiative roughly coincided. (I say “fresh” because of presidential […]
premium
brian.strosser@dlt.com'
October 25, 2018
How Can You Protect the Mid-Terms and Secure Election Networks in Minutes? premium
With the mid-term elections looming, protecting the integrity of our most basic democratic right has become a matter of critical importance.  According to the Electronic Frontier Foundation, a nonprofit organization dedicated to defending civil liberties in a digital world, election security remains just as vulnerable as in 2016 and encourages Secretaries of State to be […]
premium
andre.jones@dlt.com'
October 11, 2018
Taming the Ever-Expanding Network premium
Federal IT pros understand the challenge agencies face in trying to manage an ever-growing, increasingly complex network environment. While federal IT networks are becoming more distributed—with more devices being added all the time—the demand for security and availability is increasing as well. Yes, at some point new technologies may make networking easier and more secure; […]
premium
fking@speakerboxpr.com'
October 8, 2018
Federal Government Data Maturity Model: Drive Your Agency’s 2019 Data Strategy and Roadmap premium
Form follows function – and so should your organization’s data! Form follows function is a principle associated with 20th-century modernist architecture and industrial design which says that the shape of a building or object should primarily relate to its intended function or purpose.  Similarly, management gurus opine about successful companies’ relationships between organizational structure, mission functions, and business […]
premium
sherry.bennett@dlt.com'
October 3, 2018
DLT’s Don Maclean on Today’s Cyber Challenges premium
This month, Symantec caught up with Don Maclean, Chief Cyber Security Technologist, DLT, to get his thoughts on today’s top cyber challenges. You can hear more from Don at the Symantec Government Symposium on Oct. 30, as he shares his perspective on the “Aligning Cyber Priorities and Modernization Policies” panel. 1. Agencies are dealing with […]
premium
Don Maclean
Chief Cyber Security Technologist
September 27, 2018
As Government Cloud Adoption Reaches Inflection Point, Cyber Teams Must Prepare premium
Cloud adoption among government agencies is reaching an inflection point. Driven by the cloud’s cost-efficiencies and ability to offer an improved citizen experience, faster delivery of mission capabilities, agile development, and scale applications up and down, much of the initial reticence about cloud models is dissipating. FedRAMP has played a big part in accelerating cloud […]
premium
Government Writer
September 27, 2018
DLT’s Don Maclean Takes an In-Depth Look at CDM premium
To improve the federal government’s cybersecurity posture, the Department of Homeland Security created the Continuous Diagnostics and Mitigation (CDM) program.  On September 6, the House of Representatives voted to codify CDM, and barely two weeks later, the White House’s National Cyber Strategy assigned to DHS still more authority over cybersecurity in the United States.  What’s […]
premium
Don Maclean
Chief Cyber Security Technologist
September 27, 2018
4 Ways our Elections are Under Threat (And What We Can Do About It) premium
Fear of digital sabotage of the mid-term elections has become the biggest cybersecurity talking point of 2018. With the latest election security bill stalled in Congress and suspicions that Russia (and possibly others) are still seeking to sow divisions among the U.S. electorate, voters and political organizations are right to be worried. Ironically, the month […]
premium
Government Writer