Cybersecurity

June 19, 2017
Protect Your Files With Encryption and Information Rights Management premium
After hearing Congressman Langevin and NSA speak at the ICIT Annual Forum event it became obvious that the “Enemy with No Face” is getting in to our networks and what they want is our data. FinalCode is purpose built to protect files with encryption and Information Rights Management (IRM), sometimes called Enterprise Digital Rights Management […]
premium
Government Tech Writer
June 13, 2017
Rise of the Machines – on Both Sides of the Cybersecurity War premium
The theme of the recent ICIT Forum was “Rise of the Machines”, a call to recognize the vulnerability of an infrastructure increasingly under control of computers.  The steady increase in connected systems mandates a broad range of strategies – managing supply-chain risk, analysis of huge amounts of data through machine learning, dealing with the insider-threat […]
premium
Don Maclean
Chief Cyber Security Technologist
June 7, 2017
[Report] The New Cyber Threat Landscape: Tactics are Getting Simpler, Outcomes are Becoming Unprecedented premium
It will come as no surprise to anyone that 2016 saw an alarming increase in targeted attacks aimed at politically motivated sabotage and subversion. This new level of ambition by cyber criminals is corroborated by the annual Internet Security Threat Report from DLT partner, Symantec. The perceived success of several campaigns – particularly the U.S. […]
premium
Government Tech Writer
May 25, 2017
Getting to Know the “Enemy with No Face” is Critical to Winning the Cyber War premium
“The enemy with no face”. No, it’s not the latest Dwayne “The Rock” Johnson Hollywood action movie, but the tagline from the U.S. Army’s latest cyber warrior recruitment ad. The nameless, faceless adversary proclaims he has the power to shut down our power grids, analyze our infrastructure, and access the personal data of everyone in […]
premium
Government Tech Writer
May 18, 2017
How to Protect Your Agency Against WannaCry-Style Ransomware Attacks premium
As the worldwide fallout of the WannaCry ransomware virus continues and the blame game starts, the worldwide attack underscores the need for basic security hygiene, updating of operating systems, and regular patching writes DLT Chief Cybersecurity Technologist, Don Maclean. Unpatched software is one of the most significant vulnerabilities in the enterprise. Even though Microsoft released […]
premium
Government Tech Writer
May 15, 2017
What You Need To Know About The WannaCry Ransomware Virus premium
On May 12 a ransomware virus, WannaCry, was released on the Internet and rapidly spread to hundreds of thousands of Microsoft Windows based computers in over 150 countries.  The malware encrypts critical files on a computer, such as Excel, Word, and other important files, and seeks out backup copies for encryption as well.  Once it […]
premium
Don Maclean
Chief Cyber Security Technologist
May 15, 2017
Cyber EO: Positive Provisions, Unfortunate Omissions and Excessive Reporting premium
The White House has recently issued an Executive Order, “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.”  The Order is broad in scope, and features positive provisions, some unfortunate omissions and a seemingly excessive set of reporting requirements.  Let’s take a look. The Order begins by asserting that cybersecurity is an enterprise belonging to […]
premium
Don Maclean
Chief Cyber Security Technologist
May 11, 2017
6 Practical Tips for Protecting your Agency Against 2017’s Top Threats premium
Data breach statistics are staggering. Through the end of March 2017, there have already been over 300 major breaches and over nine million records stolen. It’s a challenging problem and one that doesn’t come with a lot of solutions. Part of the problem is understanding what the patterns are. Today’s attacks have several stages from […]
premium
Government Writer
May 2, 2017
What is Privilege Management and Where Do You Start? premium
What does privilege have to do with your agency’s security controls? The fact is that most data breaches start with privilege abuse. Think Edward Snowden. In the wake of his leaks, the NSA pledged to reduce system administrator privileges by 90%. Then there are outsiders. Most recent federal data breaches originate from attackers who exploited […]
premium
Government Tech Writer
May 1, 2017
How to Achieve NIST Compliance in the Cloud – On-Demand Webinar premium
In our recent webinar, three industry experts dissected the recently revised primary standard for security controls for federal information systems, NIST 800-53 revision 4. As more agencies in the public sector and their partners move to the cloud, security remains a top concern. Thought leaders from DLT, AWS and Evident.io exchanged perspectives on what NIST 800-53 […]
premium
Government Tech Writer