Three Ways to Reconcile the Dueling Forces of IT Modernization and Security
When it comes to network modernization and security, federal IT may be experiencing a case of dueling personalities. On one side, network modernization is essential to a better security posture. This is because outdated legacy IT systems are more prone to vulnerabilities and were never designed to handle today’s threat landscape. However, the very act of modernizing networks may actually be making those networks less secure, at least in the short term.
Want to Improve your Cybersecurity Posture? Get Beyond the Usual Suspects
From Equifax to Yahoo, WannaCry and Petra, every month seems to bring with it yet another high-profile attack. Vendors roll out patches and fixes, and questions are asked across the political and security communities.
Block Chain: The Next Big Thing?
There’s a lot of buzz about blockchain these days, even in government. In fact, we predict that 2018 will be the year of blockchain in government. Blockchain’s inherent security makes it resistant to data manipulation, making it a great tool for securely recording transactions between two parties, everything from medical records, contracts, transactions, even online voting.
Meltdown and Spectre: Here’s What Our Partners Are Doing to Protect You
No sooner do you have your arms around one cybersecurity vulnerability then another surfaces. This time it’s Meltdown and Spectre, both of which can cause data leak from kernel memory. These vulnerabilities are particularly worrying since they impact practically all computers and involve multiple IT vendors including processor players Intel, AMD, Qualcomm, and ARM.
Is Your Agency Ready for the Threat Hunt?
Targeted campaigns by malicious actors have become commonplace. As recent breaches show, these threat actors can stay hidden on agency networks for long periods of time, assessing your systems and looking for information to exfiltrate. We call them the enemy with no face.
The Inside Job: Agencies Struggle to Prevent Cyberattacks from Within
Defending against insider threats is a top priority for the U.S. government. When surveyed by MeriTalk, 85% of federal cybersecurity professionals say their agency is more focused on combating insider threats in 2017 than they were just a year ago.
This is Why 2018 Will Be the Year of Blockchain in Government
There’s been a lot of buzz about blockchain in 2017. It was only a few months ago in March 2017 that Betanews predicted that blockchain would be the buzzword that would take 2017 by storm. And it did, expanding beyond the financial community where it’s had a home for several years and breaking into other enterprise sectors.
But few foretold that blockchain would have such a hand in government digital transformation in 2017. In fact, the two go hand in hand.
What is Blockchain?
Are You Ready for the Next Federal Records Management Deadline?
Agencies breathed a sigh of relief at the end of 2016 as they met the Managing Government Records Directive (OMB Memo M-12-18) for managing all email records in an electronic format (a big step in ensuring the accountability and transparency of the federal government).
Identity Management – Closing the Gaps in State & Local Cybersecurity
Identity management, the process of identifying individuals in your system and controlling the access they have to certain resources, is an area of cyber security that state and local government employees have quite a bit of confidence in. Yet data shows there’s room for improvement.
7 Must-Have Elements of your Agency’s Incident Response Plan
DLT partner, Symantec, has put together a list of seven items you must add to any incident response plan. Here’s how it translates to government agencies.
1. Have a Workable Plan