Cybersecurity

February 5, 2018
Why and How to Secure Access to AWS with Identity Management premium
How secure is your user access to AWS infrastructure and workloads? Security to protect every user’s access to apps, endpoints and infrastructure when moving to the cloud is a hot topic. AWS’ shared responsibility model means that security and compliance is just that, shared between AWS and the customer. While AWS takes case of operating, […]
premium
DLT Solutions
Three Ways to Reconcile the Dueling Forces of IT Modernization and Security premium
When it comes to network modernization and security, federal IT may be experiencing a case of dueling personalities. On one side, network modernization is essential to a better security posture. This is because outdated legacy IT systems are more prone to vulnerabilities and were never designed to handle today’s threat landscape. However, the very act […]
premium
DLT Solutions
January 18, 2018
Want to Improve your Cybersecurity Posture? Get Beyond the Usual Suspects premium
From Equifax to Yahoo, WannaCry and Petra, every month seems to bring with it yet another high-profile attack. Vendors roll out patches and fixes, and questions are asked across the political and security communities. These enquiries and discussions almost always end up concluding that the usual cyber suspects are the culprits, writes Rob Waters, a […]
premium
Don Maclean
Chief Cyber Security Technologist
January 16, 2018
Block Chain: The Next Big Thing? premium
There’s a lot of buzz about blockchain these days, even in government. In fact, we predict that 2018 will be the year of blockchain in government. Blockchain’s inherent security makes it resistant to data manipulation, making it a great tool for securely recording transactions between two parties, everything from medical records, contracts, transactions, even online […]
premium
Don Maclean
Chief Cyber Security Technologist
Meltdown and Spectre: Here’s What Our Partners Are Doing to Protect You premium
No sooner do you have your arms around one cybersecurity vulnerability then another surfaces. This time it’s Meltdown and Spectre, both of which can cause data leak from kernel memory. These vulnerabilities are particularly worrying since they impact practically all computers and involve multiple IT vendors including processor players Intel, AMD, Qualcomm, and ARM. The […]
premium
DLT Solutions
December 11, 2017
Is Your Agency Ready for the Threat Hunt? premium
Targeted campaigns by malicious actors have become commonplace. As recent breaches show, these threat actors can stay hidden on agency networks for long periods of time, assessing your systems and looking for information to exfiltrate. We call them the enemy with no face. Take the OPM breach, for example. Hackers first entered the system in […]
premium
Government Tech Writer
December 5, 2017
The Inside Job: Agencies Struggle to Prevent Cyberattacks from Within premium
Defending against insider threats is a top priority for the U.S. government. When surveyed by MeriTalk, 85% of federal cybersecurity professionals say their agency is more focused on combating insider threats in 2017 than they were just a year ago. An insider threat is manifested as an incident when a person with authorized access to […]
premium
Don Maclean
Chief Cyber Security Technologist
December 1, 2017
This is Why 2018 Will Be the Year of Blockchain in Government premium
There’s been a lot of buzz about blockchain in 2017. It was only a few months ago in March 2017 that Betanews predicted that blockchain would be the buzzword that would take 2017 by storm. And it did, expanding beyond the financial community where it’s had a home for several years and breaking into other […]
premium
DLT Solutions
November 29, 2017
Are You Ready for the Next Federal Records Management Deadline? premium
Agencies breathed a sigh of relief at the end of 2016 as they met the Managing Government Records Directive (OMB Memo M-12-18) for managing all email records in an electronic format (a big step in ensuring the accountability and transparency of the federal government). But another deadline is looming. On December 31, 2019 agencies must […]
premium
Dana Suarez
Information Architect
November 20, 2017
Identity Management – Closing the Gaps in State & Local Cybersecurity premium
Identity management, the process of identifying individuals in your system and controlling the access they have to certain resources, is an area of cyber security that state and local government employees have quite a bit of confidence in. Yet data shows there’s room for improvement. A 2017 survey by DLT partner, Symantec, and the Government […]
premium
Government Tech Writer