Cybersecurity

April 19, 2017
[Survey] Government Faces Credibility Test Over Cybersecurity Failings premium
Two years on from the massive Office of Personnel Management (OPM) data breach, current and former officials have concluded that the greatest fallout from the hack was not the loss of documents and personal identifiable information, but to the government’s reputation, reports NextGov. Speaking at a panel discussion hosted by the Intelligence National Security Alliance, […]
premium
Government Tech Writer
April 17, 2017
Security Through Innovation — The Straight Scoop premium
On the heels of their big announcement, McAfee hosted the recent “Security Through Innovation” conference sponsored by DLT, where government and industry executives touted key ideas, changes of mindset that we need to start to win the cybersecurity war.  Covering everything from Cloud to private/public partnerships, to CDM and infrastructure, here are the top 3 key takeaways […]
premium
Don Maclean
Chief Cyber Security Technologist
April 6, 2017
The State of Threat Hunting in the 2017 SOC premium
While much of the focus on cybersecurity risks has been focused on prevention and detection, many organizations are quickly discovering that threat hunting is the next step in the evolution of their security operations center (SOC). In 2017, the Information Security Community on LinkedIn conducted an online research project (supported by DLT partner, Sqrrl) to […]
premium
Government Tech Writer
March 27, 2017
As Data Loss Prevention Goes Mainstream, One Vendor Stands Out as a Leader premium
As incidents of government data breaches increase and threat landscapes grow, savvy federal, state and local government agencies should take a look at how data loss prevention technologies can help them discover, monitor, and protect sensitive data across clouds, mobile devices, and on-premise. What is Data Loss Prevention? Data loss prevention (DLP) is a critical […]
premium
Government Writer
March 22, 2017
How Agencies Not Impacted by the Federal Hiring Freeze Can Woo Cybersecurity Talent premium
Fighting hackers is hard enough, but a huge shortage of cyber workers could leave the government exposed. According to numbers from the Bureau of Labor Statistics, there were more than 209,000 unfilled cybersecurity jobs in the U.S. in 2016, although the number could be as high as 350,000. And while the federal government has significantly […]
premium
qa@dlt.com'
March 21, 2017
5 Lessons from an Application Security Pro premium
Cyberattacks on the application layer are becoming more commonplace than attacks on servers, according to a survey of IT professionals by DLT partner, Veracode. The problem is that traditional security methods are largely ineffective against these application layer attacks. But despite this increase, it’s important to maintain perspective. A holistic and systemic approach to security […]
premium
Government Tech Writer
March 2, 2017
The Password is Dead – 6 Best Practices for Multi-Factor Authentication premium
Compromised credentials are a leading cause of security breaches.  According to Verizon’s 2015 Data Breach Investigations Report, 95% of security incidents involved stealing credentials from customer devices, and using them to web applications.  So many stolen credentials are available to hackers, generally on the Dark Web, that passwords are no longer effective. Careless cloud adoption […]
premium
Don Maclean
Chief Cyber Security Technologist
February 27, 2017
8 Principles for Securing DevOps premium
Although still in its infancy in the public sector, making the shift to DevOps methodologies is starting to catch on with many government agencies, including the U.S. Citizenship and Immigration Services, the EPA, and Nuclear Regulatory Commission. As you may know, with DevOps, IT tasks and application deployment that would normally take months or years, […]
premium
Government Tech Writer
February 23, 2017
Protect Sensitive CAD Data: 5 Steps to Reducing Data Leakage Risks premium
CAD files are highly valued and frequently shared and exchanged. But CAD files often contain confidential information and IP which can have legal data protection obligations. To protect these files collaborators may use email encryption programs, network file share access control, secure file transfer protocol, mobile device management, enterprise and cloud-based content management, and so […]
premium
qa@dlt.com'