Cybersecurity

October 18, 2017
3 Steps for Protecting PII in Government premium
From veterans to tax payers, contractors to military personnel, the U.S. government is one of the world’s largest harbors of personally identifiable information (PII). Year after year of security breaches has done nothing but destroy public trust in the government’s ability to protect PII about citizens, employees, and contractors. Protecting PII is a tricky business. […]
premium
Government Tech Writer
October 16, 2017
Blockchain to Help Department of State Reorganize premium
Earlier this summer, we wrote about how the Department of Defense is eyeing blockchain technology to improve cybersecurity. Now, Meritalk reveals that the State Department is also seeking the use of blockchain (the technology behind digital currency like Bitcoin) to protect its cyber infrastructure, improve its IT platforms and restructure the agency. Hot on the […]
premium
Don Maclean
Chief Cyber Security Technologist
October 11, 2017
Threat Hunting and Your SIEM: 10 Reasons Why You Need Both premium
I bet there was a time you loved your security information and event management (SIEM) system. This central location for managing all the security events on your network. But, as good as it may seem, many IT organizations have a love/hate relationship with their SIEM. Less than 25% of security professionals are getting full value […]
premium
Government Tech Writer
September 25, 2017
The Need for Advanced Threat Hunting premium
The 2017 DefCon conference featured former World Chess Champion Garry Kasparov, who spoke about artificial intelligence, computers, and of course, chess.  After losing a match to a purpose-built computer in 1997, Kasparov realized that the machine, although it had beaten him, was not truly intelligent:  it had simply out-calculated him, by examining over 200 million […]
premium
Don Maclean
Chief Cyber Security Technologist
September 19, 2017
[Survey] Regulations, Careless Insiders, and IT Modernization Complicate Federal Cybersecurity premium
Federal IT pros are facing “Herculean tasks” when it comes to security challenges, a new survey conducted by DLT partner, SolarWinds, reveals. Featuring insights from 200 civilian and Department of Defense (DoD) IT decision-makers, the survey explores the security challenges faced by public sector IT professionals, quantifies the sources and types of IT security threats, […]
premium
DLT Solutions
September 11, 2017
What the Equifax Breach Means for Government Cybersecurity premium
As government officials begin investigation of the Equifax breach that exposed the sensitive information of 143 million people, what does the breach mean for agencies themselves? After all, the U.S. government stores far more sensitive data than the private sector, and often stores it on older, more vulnerable systems. This makes the government a top […]
premium
Government Tech Writer
September 8, 2017
An A-B-C Approach to Security Compliance Challenges premium
When it comes to enhancing their cybersecurity postures, federal agencies have to wade through an entire alphabet soup of regulatory compliance guidelines. From the RMF (Risk Management Framework) to FISMA (Federal Information Security Management Act) and DISA STIGs (Defense Information Systems Agency Security Technical Implantation Guides), there are a number of requirements that agencies must […]
premium
DLT Solutions
September 5, 2017
How to Detect a Rogue Device the Instant It Connects to your Network premium
Hackers are ruthless in their persistence and fortitude. It can take weeks or months for them to gather intelligence on your IT vulnerabilities, penetrate your network, and exfiltrate your precious data. But they know, and statistics prove this, that, for the most part, their victims have no idea that their network infrastructure is under attack […]
premium
Government Tech Writer
August 24, 2017
DoD Eyes Blockchain Technology to Improve Cybersecurity premium
Could the technology that powers shadowy online cryptocurrencies used by terrorists, cyber criminals, and money launderers soon be deployed by the Department of Defense? Blockchain, the technology that underpins the Bitcoin, is the latest rush of digital transformation technologies that could dramatically improve security across the U.S. military preventing hacks, tampering and cyberhijackings of vehicles, […]
premium
Jeremy Young
Vice President of Cybersecurity
August 22, 2017
[Webinar] Proven Tips to Help You Achieve Compliance with DFARS 7012 premium
Another month, another regulation deadline to comply with. But this time, it’s defense contractors who are in the hot seat. To safeguard defense information in non-federal systems and organizations, U.S. defense contractors and soon all federal agencies, must meet the DFARS 7012 mandate and implement all of the requirements of NIST Special Publication 800-171 Protecting […]
premium
Government Tech Writer