Cybersecurity

What Agencies Need to Consider When Updating Password Protocols in 2018 premium
Movies and TV would have us believe that data breaches are long, hard-fought battles between the good guy and the bad guy—and the bad guy wins. That could not be further from reality. Hackers are opportunistic. They want to spend as little time as possible getting into the system, getting what they need, getting out, […]
premium
fking@speakerboxpr.com'
Key Findings of 2018 Cyber Threat Report and How Government Can Respond premium
Symantec’s 2018 Internet Security Threat Report is here. Based on data collected by Symantec’s massive security infrastructure (the largest civilian threat collection network in the world), the report has become the de facto standard for giving enterprises and public organizations essential information to help secure their systems effectively. By the nature of the topic, the […]
premium
DLT Solutions
After Atlanta SamSam Ransomware Attack, Learn How to Better Protect your Agency premium
Another day, another government ransomware victim. On March 22nd, 2018, the city of Atlanta found itself locked out of computers across government offices and facing a ransom demand of $51,000 or $6,800 per computer, GCN reported. The attack affected internal systems and citizen-facing apps that residents use to pay bills and access court-related information. The […]
premium
DLT Solutions
Breakthrough in Ransomware Prevention is Good News for Government Agencies premium
Ransomware is quickly becoming the favored means for criminals to extract a profit from unsuspecting villains – most notably in the public sector. Throughout 2017 ransomware grabbed the headlines – WannaCry, Petya, etc. – both of which targeted government agencies. When they succeed the implications can be serious. Licking County in Ohio fell victim to […]
premium
DLT Solutions
Active Directory’s Attack Surface is Huge – Here’s How to Find a Threat Needle in its Log Haystack premium
Microsoft Active Directory is a critical tool that helps system administrators manage user privileges and secure their IT infrastructure, yet Active Directory presents several security challenges. Most problematic is that Active Directory’s attack surface is huge. Targets for attack include every domain name user account, admin and security group, domain controller, backup, admin workstation, and […]
premium
bradley.gernat@dlt.com'
March 7, 2018
SaaS Offering Simplifies Remote Application Access Control, Reduces Attack Surface premium
Ransomware tops today’s list of security concerns for governments, and no agency is immune. Just look at the statistics: • Cook County, Chicago was a victim of last year’s WannaCry ransomware attack. • St. Louis Public Library was hit with ransomware, demanding $35,000 in Bitcoin. • Bingham County, Idaho paid out #3,000 in ransomware to […]
premium
DLT Solutions
March 5, 2018
The Cybersecurity Skills Shortage Threat and What Your Agency Can Do About It premium
Cybersecurity skills shortages are nothing new. But new research shows that they are creating recruiting chaos. CSO Online reports that 45% of organizations claim to have problematic shortage of cyber skills and 70% of organizations report the skills shortage has had a direct impact such as increased workload on existing staff, the need to hire […]
premium
Government Tech Writer
February 5, 2018
Why and How to Secure Access to AWS with Identity Management premium
How secure is your user access to AWS infrastructure and workloads? Security to protect every user’s access to apps, endpoints and infrastructure when moving to the cloud is a hot topic. AWS’ shared responsibility model means that security and compliance is just that, shared between AWS and the customer. While AWS takes case of operating, […]
premium
DLT Solutions
Three Ways to Reconcile the Dueling Forces of IT Modernization and Security premium
When it comes to network modernization and security, federal IT may be experiencing a case of dueling personalities. On one side, network modernization is essential to a better security posture. This is because outdated legacy IT systems are more prone to vulnerabilities and were never designed to handle today’s threat landscape. However, the very act […]
premium
DLT Solutions
January 18, 2018
Want to Improve your Cybersecurity Posture? Get Beyond the Usual Suspects premium
From Equifax to Yahoo, WannaCry and Petra, every month seems to bring with it yet another high-profile attack. Vendors roll out patches and fixes, and questions are asked across the political and security communities. These enquiries and discussions almost always end up concluding that the usual cyber suspects are the culprits, writes Rob Waters, a […]
premium
Don Maclean
Chief Cyber Security Technologist