How to Choose a Network Access Control Solution that is Right For Your Network

Traditional IT security has always focused on static, well-controlled IT environments. However, with the advent of BYOD policies and more and more mobile devices connecting to workplace networks, a new, more fluid paradigm has evolved. How does IT make the shift and take charge of these dynamic and very difficult to control environments?

The Cyber Talent Drought

Black hat hackers make more money than white hat hackers.  A lot more.  The 2015 Symantec Internet Security Threat report states that a hacker can sell a credit card number for about $50 on the black market.  If you can steal 100,000 numbers in a few months, you stand to earn about $5 million.  This money pales in comparison to what a bad actor can get for a purloined medical record:  about $500 per record, according to the same report.  Steal 100,000 of those, and you’ll get a whopping $50 mil

3 Best Practices to Help Sift Through Cybersecurity Challenges

At this point, it probably seems like there’s almost as much information out there about how to combat cybersecurity threats as there are threats themselves. Every day there’s a new report that contains a wealth of valuable – and sometimes, disturbing – information. It’s enough to make a federal IT pro feel overwhelmed.
Like so many other things, though, it’s helpful to remember that the foundation for a successful approach to defending against cyber threats can ultimately be boiled down to a few core best practices:

Security 101: Advanced Persistent Threat (APT)

An advanced persistent threat (APT) is a network attack in which an unauthorized individual gains access to a network and then stays in the network, undetected, for a long period of time.[1] APTs use multiple phases to break into networks and avoid detection. During this period of time, the attacker will scan the network for confidential information.  There are usually five phases of an APT attack. The first is reconnaissance, in which the attacker leverages information to understand the target.

New Data Sheds Light on What Can be Learned from Attacks Against Cloud Environments

2014 was a banner year for high-profile security breaches. The Sony hack, big box store data breaches, and the rumblings of problems at the federal government’s Office of Personnel Management all contributed to a problematic year for IT, business and government leaders.

Many of these breaches stemmed from inadequately protected on-premise systems, but what’s been going on with cloud security? For answers look no further than DLT partner, Alert Logic’s newly released 2015 Cloud Security Report.

How to “Contain” the Threat that’s Holding Back Government BYOD Programs

Bring Your Own Device (BYOD) programs are popping up across corporate America. Yet many in the U.S. government still eye this cost-saving strategy (less infrastructure = reduced IT footprint) with caution.

Security and liability are among the top concerns that are stalling widespread adoption with many government officials finding BYOD programs to be “more trouble than they’re worth” (Forrester).