Cybersecurity

August 3, 2017
15 Easy Ways to Integrate, Orchestrate, and Expedite Security Operations premium
Securing government networks and systems takes a village. Keeping pace with attacks and shortage of security talent has driven security operations to pool data resources and orchestrate actions across vendors, open source projects, and internal development efforts. It’s a community effort. Sharing threat information and codifying procedures to better fend off the enemy with no […]
premium
Government Tech Writer
July 25, 2017
The Cyber Shield Act – Modernizing Security Standards for IOT premium
The Cyber Shield Act, commissioned by Senator Ed Markey, recommends the establishment of a voluntary program to institute uniform cybersecurity and data benchmarks for consumer devices. The goal of the bill is to improve consumer decision making from the point of purchase, standardized by industry and maintained by manufacturers – similar to an EPA energy […]
premium
Don Maclean
Chief Cyber Security Technologist
July 11, 2017
Time is Running out for Government Contractors to Meet Key Cybersecurity Compliance Deadline premium
Time is running out for federal contractors to comply with the Federal Controlled Unclassified Information (CUI) Program. What does the CUI Program mean to contractors? As of December 31, 2017, all federal contracts will require that businesses contracting with the federal government must comply with the Federal CUI rule (32 CFR Part 2002) which strives […]
premium
Government Tech Writer
July 3, 2017
Don’t Pay the Ransom: How to Protect your Networks Against Petya premium
Another nameless, faceless adversary (or as the U.S Army calls them “the enemy with no face”) struck again in the last week of June. Hot on the heels of WannaCry attack in May, the Petya ransomware campaign brought widespread disruption to organizations, government agencies, and infrastructure worldwide. Like WannaCry, the ransomware targets Windows systems, encrypts […]
premium
Jeremy Young
Vice President of Cybersecurity
June 28, 2017
Smart Cities are a Hacker’s Playground – Here’s What You Can Do premium
It’s clear that smart technologies and the Internet of Things (IoT) are the future of our communities. But, is your agency ready for the billions – soon to be trillions – of sensors and devices connected to one another that will transform our society? The risks of a breach or attack, particularly to vulnerable network […]
premium
Government Tech Writer
June 19, 2017
Protect Your Files With Encryption and Information Rights Management premium
After hearing Congressman Langevin and NSA speak at the ICIT Annual Forum event it became obvious that the “Enemy with No Face” is getting in to our networks and what they want is our data. FinalCode is purpose built to protect files with encryption and Information Rights Management (IRM), sometimes called Enterprise Digital Rights Management […]
premium
Government Tech Writer
June 13, 2017
Rise of the Machines – on Both Sides of the Cybersecurity War premium
The theme of the recent ICIT Forum was “Rise of the Machines”, a call to recognize the vulnerability of an infrastructure increasingly under control of computers.  The steady increase in connected systems mandates a broad range of strategies – managing supply-chain risk, analysis of huge amounts of data through machine learning, dealing with the insider-threat […]
premium
Don Maclean
Chief Cyber Security Technologist
June 7, 2017
[Report] The New Cyber Threat Landscape: Tactics are Getting Simpler, Outcomes are Becoming Unprecedented premium
It will come as no surprise to anyone that 2016 saw an alarming increase in targeted attacks aimed at politically motivated sabotage and subversion. This new level of ambition by cyber criminals is corroborated by the annual Internet Security Threat Report from DLT partner, Symantec. The perceived success of several campaigns – particularly the U.S. […]
premium
Government Tech Writer
May 25, 2017
Getting to Know the “Enemy with No Face” is Critical to Winning the Cyber War premium
“The enemy with no face”. No, it’s not the latest Dwayne “The Rock” Johnson Hollywood action movie, but the tagline from the U.S. Army’s latest cyber warrior recruitment ad. The nameless, faceless adversary proclaims he has the power to shut down our power grids, analyze our infrastructure, and access the personal data of everyone in […]
premium
Government Tech Writer
May 18, 2017
How to Protect Your Agency Against WannaCry-Style Ransomware Attacks premium
As the worldwide fallout of the WannaCry ransomware virus continues and the blame game starts, the worldwide attack underscores the need for basic security hygiene, updating of operating systems, and regular patching writes DLT Chief Cybersecurity Technologist, Don Maclean. Unpatched software is one of the most significant vulnerabilities in the enterprise. Even though Microsoft released […]
premium
Government Tech Writer