Man-in-the-Middle Cyber Attacks | What & How
What is a Man-in-the-Middle attack and why is it so worrisome for cybersecurity experts? Josh defines it, offers examples, and explains why they're currently so devastating.
An Interview with Aneesh Chopra, Former US Chief Technology Officer
Aneesh Chopra, former and first chief technology officer of the United States, sat down with Van Ristau, DLT Solutions’ own chief technology office to talk about the upcoming GovDefenders Online Event.
An Interview with Dr. Ron Ross, NIST Fellow & GovDefenders Keynote
Last week, Dr. Ron Ross, keynote speaker at GovDefenders, sat down with DLT Solutions’ chief cloud technologist, David Blankenhorn, for a pre-event interview. Dr. Ross is a fellow at the National Institute of Standards and Technology (NIST) wherehis current focus areas include information security and risk management.
People Are Federal IT’s Biggest IT Security Challenge: An Interview with SolarWinds’ VP Product Management
A couple weeks ago, SolarWinds released their newest federal IT cybersecurity survey. Chris LaPoint, VP Product Management, SolarWinds, was kind enough (as always) to talk with us about their findings and provide context to them.
GovDefenders: An Interview with John Slye, Deltek Cybersecurity Analyst
Earlier in the week, John Slye, one of GovDefenders’ keynote speakers, sat down with us for a pre-event interview. He specializes in market trends, forecasting, and government spending analysis across vertical markets, including information technology, cybersecurity, homeland security, and defense.
GovDefenders: An Interview with Van Ristau, CTO of DLT Solutions
Frequent Technically Speaking blogger Van Ristau, CTO at DLT Solutions, is this year’s moderator for the GovDefenders’ panel on the Framework for Improving Critical Infrastructure Cybersecurity. He was kind enough to answer a few of our questions about it.
What Hollywood Teaches Us About Cybersecurity
I’ve recently been on a bit of a hacking movie binge. While most people write them off as pure fantasy, even the worst have cybersecurity lessons we can learn from - yes, even Weird Science. Here are four movies and what they teach. Consider this Hollywood Cybersecurity 101.
How Well Do You Secure Your Virtual Infrastructure?
Virtualization is the fancy, not-so-new-ish technology that everyone wants to deploy right now. But how do we protect such a technology?
The Internet of Hackable Things
The market for wearable technology will explode over the next three years, bringing about the age of the Internet of Things and everyday cybersecurity issues like the aforementioned. And thanks to a recent Symantec finding, hackers aren’t waiting for popular adoption before using what’s already on the market to spy. You think BYOD is bad now? Hold tight.
DLT Went Phishing
We decided to teach our employees about cybersecurity. So we phished them to find out what would happen. Read about those results, the lessons we learned, and how we trained employees on the danger.