Cybersecurity

March 27, 2017
As Data Loss Prevention Goes Mainstream, One Vendor Stands Out as a Leader premium
As incidents of government data breaches increase and threat landscapes grow, savvy federal, state and local government agencies should take a look at how data loss prevention technologies can help them discover, monitor, and protect sensitive data across clouds, mobile devices, and on-premise. What is Data Loss Prevention? Data loss prevention (DLP) is a critical […]
premium
Government Writer
March 22, 2017
How Agencies Not Impacted by the Federal Hiring Freeze Can Woo Cybersecurity Talent premium
Fighting hackers is hard enough, but a huge shortage of cyber workers could leave the government exposed. According to numbers from the Bureau of Labor Statistics, there were more than 209,000 unfilled cybersecurity jobs in the U.S. in 2016, although the number could be as high as 350,000. And while the federal government has significantly […]
premium
qa@dlt.com'
March 21, 2017
5 Lessons from an Application Security Pro premium
Cyberattacks on the application layer are becoming more commonplace than attacks on servers, according to a survey of IT professionals by DLT partner, Veracode. The problem is that traditional security methods are largely ineffective against these application layer attacks. But despite this increase, it’s important to maintain perspective. A holistic and systemic approach to security […]
premium
Government Tech Writer
March 2, 2017
The Password is Dead – 6 Best Practices for Multi-Factor Authentication premium
Compromised credentials are a leading cause of security breaches.  According to Verizon’s 2015 Data Breach Investigations Report, 95% of security incidents involved stealing credentials from customer devices, and using them to web applications.  So many stolen credentials are available to hackers, generally on the Dark Web, that passwords are no longer effective. Careless cloud adoption […]
premium
Don Maclean
Chief Cyber Security Technologist
February 27, 2017
8 Principles for Securing DevOps premium
Although still in its infancy in the public sector, making the shift to DevOps methodologies is starting to catch on with many government agencies, including the U.S. Citizenship and Immigration Services, the EPA, and Nuclear Regulatory Commission. As you may know, with DevOps, IT tasks and application deployment that would normally take months or years, […]
premium
Government Tech Writer
February 23, 2017
Protect Sensitive CAD Data: 5 Steps to Reducing Data Leakage Risks premium
CAD files are highly valued and frequently shared and exchanged. But CAD files often contain confidential information and IP which can have legal data protection obligations. To protect these files collaborators may use email encryption programs, network file share access control, secure file transfer protocol, mobile device management, enterprise and cloud-based content management, and so […]
premium
qa@dlt.com'
February 8, 2017
Using AI to Stay One Step Ahead of Cyber Criminals  premium
The history of hacking shows that bad actors use good technologies for bad purposes.  Machine learning is no different: it has never been easier for white hats and black hats to obtain and learn the tools of the machine learning trade. Software is readily available at little or no cost, and machine learning tutorials are just as easy to […]
premium
Don Maclean
Chief Cyber Security Technologist
February 7, 2017
Securing the Cyber Frontlines with the Right Workforce and Collaboration premium
Last month’s ICIT Winter Summit hosted a packed house of cybersecurity thought leaders from the industry and the public sector. The summit convened with an opening keynote on Securing the Cyber Frontline from Brigadier General (Ret.) Greg Touhill, former Federal CISO. After Touhill’s speech, in which he delivered his recommendations for national cybersecurity strategy, the expert […]
premium
qa@dlt.com'
February 6, 2017
Detect and Secure IoT and Rogue Devices, While Satisfying NIST RMF Security Requirements premium
We all know that the Internet of Things (IoT) is here. But IT professionals responsible for enterprise communications networks aren’t exactly sure where IoT resides on their networks or whether these devices are secured. Rogue devices are everywhere (although not all are out to steal the blueprints to the Death Star) but according to a […]
premium
Government Tech Writer
January 25, 2017
A Security Wish List for the New Administration Starts with Multi-Factor Authentication premium
Late last year, the government’s Commission on Enhancing National Cybersecurity published a detailed report, at President Obama’s request, to provide short- and long-term recommendations to strengthen cybersecurity in the public and private sector (you can read the full report on the NIST website). Essentially, the report contains a guiding set of principles for the next […]
premium
Government Tech Writer