Filter Resources

Webinar
"Cyber Hygiene"—like so many buzzwords in our industry, this one gets more use than understanding. What exactly is cyber hygiene? Do government agencies keep it up sufficiently? If not, why not? How does cyber hygiene affect an agency's ability to implement advanced security technology? What are the financial, psychological, and technological factors that affect cyber hygiene? This webinar, featuring Don MacLean, Steve Potter, David Henderson, and Paul Parker, explores these topics and more.
Other
AFCEA West 2019 is the premier naval conference and exposition on the West Coast and is celebrating its’ 29th year of bringing military and industry leaders together. Government and industry will have the opportunity to learn and network while exploring and experiencing the latest platforms, leading-edge technologies and state-of-the-art networking capabilities that support the Sea Services’ operations.
DLT is the premier government solutions aggregator dedicated to ensuring the public sector has the cybersecurity solutions it needs. DLT is constantly in tune with emerging cybersecurity technologies that change how we think about securing government information systems. We help government protect high-value assets: data, devices, software, systems, and users.
Data Sheet
What Really Drives Security Procurements and Decisions
Whitepaper
For the past two years, Sumo Logic has produced the first and only industry report that quantitatively defines the state of the Modern App Stack. Working with our customers, we continue to see rapid advances in tools and processes used by various enterprise personas to build, run and secure modern applications. This third annual report extends our analysis to DevSecOps, a new and innovative trend that is rapidly growing amongst our customers.
Case Study
Organizations around the world are adopting, building or shifting resources, applications and workloads to the cloud to take advantage of the inherent competitive, economic and agility gains that can be achieved in this environment. However many of these organizations are finding that their legacy network and security tools are not able to provide them with the scalability and insights they need, to continue tightly managing their security and compliance requirements in the cloud.
Other
The following report, sponsored by Sumo Logic, is based on a global survey of 316 IT security professionals responsible for environments with significant investment in both cloud and on-prem infrastructure. The goal of this survey was to quantify current experiences with adopting traditional security methods in the cloud, with a focus on both organizations and tools.
Case Study
Hidden Lake Technology has contracted with DLT Solutions to provide professional services in support of DLT’s Amazon Web Services customer base. These engineering services will support the Amazon Web Services platform and related customer challenges including consulting, migrations, security and cloud optimization. This strategic partnership brings a top services delivery team into the DLT Partner Network, expanding capabilities and maximizing value for customers.
Other
In this webinar, Morgan Hein, discusses a new Open Source tool, EnVisen, which lets you view the exported symbols and ROP gadget surface area of your binaries in a visually rich and purposeful way from directly within your browser. It can even compare binaries to visualize common attackable surface area and score your Zero-Day vulnerability risk with built in entropy evaluation.
Whitepaper
CA API Gateway enables new programs to transfer information between security domains through legacy high-assurance guards.
Publication
Tripwire's integrated suite of products build on their core capabilities to deliver critical capabilities for breach detection and remediation, and address nearly every compliance standard—PCI DSS, NIST, FISMA, NERC, HIPAA, ISO/IEC 27002, DISA, SOX, and many others.
Publication
When a high-profile cyberattack grabs the headlines, your first instinct may be to funnel resources into purchasing a shiny new tool to defend your organization. But often, that’s not what’s really needed.
Publication
Tripwire solutions have a history with government agencies, offering an 'ironclad defense,' or foundation for a layered compliance and security strategy.
Whitepaper
Security and compliance remain at the forefront of concerns facing security leaders today. Tackling the challenge of finding and addressing risks in the enterprise while demonstrating compliance with increasingly demanding regulations requires the maturity and discipline to adopt and follow a complete security risk and compliance lifecycle.
Whitepaper
Year after year, investigations performed after breaches and other security incidents reveal that the majority of security incidents occur because well-known security controls and practices were not implemented or were not working as organizations had assumed. And the major problem in cyber security remains a lack of defined and repeatable processes for selecting, implementing and monitoring the security controls that are most effective against real-world threats.

Pages