Farihah Sattar

Government Tech Writer
December 11, 2017
Is Your Agency Ready for the Threat Hunt? premium
Targeted campaigns by malicious actors have become commonplace. As recent breaches show, these threat actors can stay hidden on agency networks for long periods of time, assessing your systems and looking for information to exfiltrate. We call them the enemy with no face. Take the OPM breach, for example. Hackers first entered the system in […]
premium
Government Tech Writer
November 20, 2017
Identity Management – Closing the Gaps in State & Local Cybersecurity premium
Identity management, the process of identifying individuals in your system and controlling the access they have to certain resources, is an area of cyber security that state and local government employees have quite a bit of confidence in. Yet data shows there’s room for improvement. A 2017 survey by DLT partner, Symantec, and the Government […]
premium
Government Tech Writer
November 16, 2017
7 Must-Have Elements of your Agency’s Incident Response Plan premium
DLT partner, Symantec, has put together a list of seven items you must add to any incident response plan. Here’s how it translates to government agencies. 1. Have a Workable Plan An incident response plan is your roadmap for responding to a cybersecurity attack. In this NextGov interview with Symantec’s Robert Myles and DLT’s Don […]
premium
Government Tech Writer
June 7, 2017
[Report] The New Cyber Threat Landscape: Tactics are Getting Simpler, Outcomes are Becoming Unprecedented premium
It will come as no surprise to anyone that 2016 saw an alarming increase in targeted attacks aimed at politically motivated sabotage and subversion. This new level of ambition by cyber criminals is corroborated by the annual Internet Security Threat Report from DLT partner, Symantec. The perceived success of several campaigns – particularly the U.S. […]
premium
Government Tech Writer
May 18, 2017
How to Protect Your Agency Against WannaCry-Style Ransomware Attacks premium
As the worldwide fallout of the WannaCry ransomware virus continues and the blame game starts, the worldwide attack underscores the need for basic security hygiene, updating of operating systems, and regular patching writes DLT Chief Cybersecurity Technologist, Don Maclean. Unpatched software is one of the most significant vulnerabilities in the enterprise. Even though Microsoft released […]
premium
Government Tech Writer
May 2, 2017
What is Privilege Management and Where Do You Start? premium
What does privilege have to do with your agency’s security controls? The fact is that most data breaches start with privilege abuse. Think Edward Snowden. In the wake of his leaks, the NSA pledged to reduce system administrator privileges by 90%. Then there are outsiders. Most recent federal data breaches originate from attackers who exploited […]
premium
Government Tech Writer
May 1, 2017
How to Achieve NIST Compliance in the Cloud – On-Demand Webinar premium
In our recent webinar, three industry experts dissected the recently revised primary standard for security controls for federal information systems, NIST 800-53 revision 4. As more agencies in the public sector and their partners move to the cloud, security remains a top concern. Thought leaders from DLT, AWS and Evident.io exchanged perspectives on what NIST 800-53 […]
premium
Government Tech Writer
April 6, 2017
The State of Threat Hunting in the 2017 SOC premium
While much of the focus on cybersecurity risks has been focused on prevention and detection, many organizations are quickly discovering that threat hunting is the next step in the evolution of their security operations center (SOC). In 2017, the Information Security Community on LinkedIn conducted an online research project (supported by DLT partner, Sqrrl) to […]
premium
Government Tech Writer
March 21, 2017
5 Lessons from an Application Security Pro premium
Cyberattacks on the application layer are becoming more commonplace than attacks on servers, according to a survey of IT professionals by DLT partner, Veracode. The problem is that traditional security methods are largely ineffective against these application layer attacks. But despite this increase, it’s important to maintain perspective. A holistic and systemic approach to security […]
premium
Government Tech Writer
January 11, 2017
[Webinar] How State Agencies Can Assess their Cloud Readiness Factor premium
Is your state or local agency ready for the cloud? Whether you’re thinking of moving to a SaaS email system or migrating data to cloud storage and processing platforms, a cloud readiness assessment might be in order. Before you make the move to the cloud, risks need to be assessed and technical readiness must be […]
premium
Government Tech Writer