How The IRS Data Breach Occurred
The IRS breach was exceedingly low-tech: it’s at the other end of the spectrum from the infamous and sophisticated Chinese hacking operations. This was just a bunch of bad actors who stole – or bought on the black market – personally identifiable information (PII) on a large number of American taxpayers. They accessed the IRS “Get Transcript” application, and provided answers (or educated guesses) in response to personal questions about their victims. This allowed them to access tax returns and other filings, facilitating lucrative identity thefts in the future.
The 6 Elements of a Government Insider Threat Program
Insider threats are a persistent problem for government agencies and it’s no longer an IT problem. According to DailyCaller.com, 21% of breaches can be traced back to security indiscretions by federal workers (although other source point to the number being as high as 50%).
So it’s no surprise that preventing and mitigating these threats was a hot topic at this year’s Symantec Government Symposium in Washington, D.C.
Solving the Identity Problem - Gov Experts Share Pearls of Wisdom
Why is identity such a complex problem to solve? That was the first question posed by moderator Nico Popp, Vice President of Information and Identity Protection with Symantec during a panel session on identity overload at the 2015 Symantec Government Symposium in Washington, D.C.
To better understand the identity problem, Popp suggests we think of identity as a triangle.
First, there is security.
How to Get CDM Right – Gov Leaders Offer Valuable Insights
As agencies get ready to roll out the DHS’ Continuous Diagnostics and Mitigation (CDM) Program, feedback from early implementations got audiences excited and reassured at the 2015 Symantec Government Symposium in Washington, D.C.
Ready for the Cloud? Get an Introduction to FedRAMP
The White House Clears the Way for Sanctions Against Hackers
When it comes to cybersecurity, once again The White House means business.
Piece Together the Government Tech Puzzle – 5 Online Trainings
Where can you learn about the latest tech trends in government, network with thousands of federal, state and local govies and earn up to 5 continuing professional education (CPE) credits?!?
Answer: Your desk!
DLT is proud to sponsor the fourth annual GovLoop Government Innovators Virtual Summit taking place on April 22nd from 10 AM – 5 PM ET.
Fed IT Security Hardens, but User Authentication Remains Weak
On February 27, FISMA presented its annual report to Congress. The report (compiled by the OMB) provides metrics on federal cybersecurity incidents, efforts to mitigate them, and progress in implementing cybersecurity policies and programs.
The good news is that there is progress to report, with nearly 70,000 information security issues reported in FY’ 2014, up 15% over the previous year – there is still work to be done.
7 Free eBooks that Demystify Public Sector IT Trends
Who doesn’t love a freebie! But what about a freebie that can actually help you make better decisions about your technology purchases – whether you’re a CIO, program manager, IT manager or end user.
DLT has assembled a large selection of eBooks that set about to demystify technology concepts – from cloud computing to continuous monitoring, and more. We help you go beyond lofty concepts and get down to the nitty gritty of how your agency can find and make the best of its investments.
As DoD Eyes Internet of Things for New Uses Cases, Security Concerns Remain
The “Internet of Things” isn’t exactly a new concept, Kevin Ashton coined the term the Internet of Things as far back as 1999. Now, 15 years later, the Department of Defense (DoD) is eager to exploit it.
What is the Internet of Things?