Cybersecurity

January 16, 2019
BYOx for the Most Secure Spaces premium
Article written by Jim Hansen, VP of Products, Security, SolarWinds Earlier this year, the Department of Defense (DoD) released a policy memo stating that DoD personnel—as well as contractors and visitors to DoD facilities—may no longer carry mobile devices in areas specifically designated for “processing, handling, or discussion of classified information.” For federal IT pros, managing […]
premium
qa@dlt.com'
December 28, 2018
White House Cybersecurity Strategy: The Essence premium
The “National Cyber Strategy”, released recently by the White House, offers a broad blueprint for America’s approach to cybersecurity.  Let’s look its four “pillars”, and their key elements. 1. Protecting the American People, Homeland, and the American Way of Life Such a broad mandate obviously covers a lot of ground, but some key items to […]
premium
don.maclean@dlt.com'
December 3, 2018
CrowdStrike Expands Public Sector Footprint as DLT Reinvests in Partner Ecosystem premium
In a recent blog post, DLT Chief Technology Officer David Blankenhorn shared his insight on DLT’s evolution to a government solutions aggregator: “At DLT, we are doubling down on our key capabilities. DLT has had a partner ecosystem for many years, but we are now reinvesting in that ecosystem. We are reinvesting in our market […]
premium
melissa.perez@dlt.com'
November 26, 2018
Cyber Hygiene: Five Ways to Make Your Bed premium
“Cyber Hygiene”:  you know the term, but what does it really mean? Some say it is an ill-defined set of practices for individuals to follow (or ignore). Others say it is a measure of an organization’s overall commitment to security.  Still, others think of “cyber hygiene” as simple, readily available technologies and practices for cybersecurity. […]
premium
don.maclean@dlt.com'
November 14, 2018
See Beyond the Noise: How Nuix Uncovers and Prevents Entitlement Fraud premium
Benefits and social security fraud are a huge cost to taxpayers. In 2016, the White House estimated these losses at $144 billion. Fraud can take many forms from making false statements on a social security claim, misuse of benefits by a family member or friend, altering claims, duplicate billing for the same service, embezzlement, and […]
premium
melissa.perez@dlt.com'
November 8, 2018
City of Fort Worth, TX, Protects Sprawling IT Environment with Powerful And Innovative Endpoint Security premium
City of Fort Worth, TX, Protects Sprawling IT Environment with Powerful And Innovative Endpoint Security The 2018 Verizon Data Breach Investigations Report (DBIR) showed that the public sector is one of the top three most exploited sectors in the United States, with more than 300 reported cyber breaches in 2017 alone.  Any cyber attack on […]
premium
melissa.perez@dlt.com'
October 25, 2018
How Can You Protect the Mid-Terms and Secure Election Networks in Minutes? premium
With the mid-term elections looming, protecting the integrity of our most basic democratic right has become a matter of critical importance.  According to the Electronic Frontier Foundation, a nonprofit organization dedicated to defending civil liberties in a digital world, election security remains just as vulnerable as in 2016 and encourages Secretaries of State to be […]
premium
andre.jones@dlt.com'
October 3, 2018
DLT’s Don Maclean on Today’s Cyber Challenges premium
This month, Symantec caught up with Don Maclean, Chief Cyber Security Technologist, DLT, to get his thoughts on today’s top cyber challenges. You can hear more from Don at the Symantec Government Symposium on Oct. 30, as he shares his perspective on the “Aligning Cyber Priorities and Modernization Policies” panel. 1. Agencies are dealing with […]
premium
don.maclean@dlt.com'
September 27, 2018
As Government Cloud Adoption Reaches Inflection Point, Cyber Teams Must Prepare premium
Cloud adoption among government agencies is reaching an inflection point. Driven by the cloud’s cost-efficiencies and ability to offer an improved citizen experience, faster delivery of mission capabilities, agile development, and scale applications up and down, much of the initial reticence about cloud models is dissipating. FedRAMP has played a big part in accelerating cloud […]
premium
Government Writer
September 27, 2018
DLT’s Don Maclean Takes an In-Depth Look at CDM premium
To improve the federal government’s cybersecurity posture, the Department of Homeland Security created the Continuous Diagnostics and Mitigation (CDM) program.  On September 6, the House of Representatives voted to codify CDM, and barely two weeks later, the White House’s National Cyber Strategy assigned to DHS still more authority over cybersecurity in the United States.  What’s […]
premium
don.maclean@dlt.com'