Exclusive Interview: Steve Wells Discusses DLT Contract Expertise and Reflects on Military Career

This week we sat down with DLT Senior Director of Program Management, Steve Wells, to discuss how DLT's contract expertise can be beneficial to its technology company clients and public sector customers, particularly as we approach the end of the Federal Fiscal Year. We also discussed Steve's military career, of which he just celebrated a major milestone.

Interviewer: Hi Steve, thanks for sitting down with us today. To start, why don’t you tell us a little bit about what you do at DLT.

How to Take Advantage of Federal Fiscal Year-End as a Solutions Provider

An irony of late appropriations – as the federal government experienced for the umpteenth time in fiscal 2018 – is that rather than rush to spend, your federal customers are actually spending at rates below what they’re authorized to spend. That makes it harder to maximize the year-end spending blitz.

It takes some doing, but if you’ve got the fortitude to plow through reports from the Bureau of the Fiscal Services and the Congressional Budget Office (CBO), it’s possible to discern that agencies simply might not have the time and manpower to execute on every program.

Federal Agencies are Playing a Game of Hope with Two-Factor Authentication

Shortly after the federal government suffered it’s largest and costliest data breach ever at the Office of Personnel Management (OPM), a post-mortem analysis found that the breach was entirely preventable, and the exfiltration of security clearance files of government employees and contractors could have been prevented through the implementation of two-factor authentication for remote log-ons.

What Agencies Need to Consider When Updating Password Protocols in 2018

Movies and TV would have us believe that data breaches are long, hard-fought battles between the good guy and the bad guy—and the bad guy wins. That could not be further from reality. Hackers are opportunistic. They want to spend as little time as possible getting into the system, getting what they need, getting out, and exploiting it as fast as possible.

Meet GovDesignHub: At the Crossroads of Public Sector and Digital Design

The CAD and digital design sector is vast and growing at breakneck speed. It’s expected to reach $11.21 billion by 2023.

Many end-use industries such as automotive, aerospace, entertainment, industrial machinery, civil and construction, electrical and electronics, pharmaceutical, and healthcare, consumer goods, and others, widely use CAD and 3D design-based tools in their development processes.

Key Findings of 2018 Cyber Threat Report and How Government Can Respond

Symantec’s 2018 Internet Security Threat Report is here. Based on data collected by Symantec’s massive security infrastructure (the largest civilian threat collection network in the world), the report has become the de facto standard for giving enterprises and public organizations essential information to help secure their systems effectively.

By the nature of the topic, the report isn’t an easy read. Expect to be perturbed. However, the insights provided into today’s rapidly evolving threat landscape are invaluable.

Active Directory’s Attack Surface is Huge – Here’s How to Find a Threat Needle in its Log Haystack

Microsoft Active Directory is a critical tool that helps system administrators manage user privileges and secure their IT infrastructure, yet Active Directory presents several security challenges. Most problematic is that Active Directory’s attack surface is huge. Targets for attack include every domain name user account, admin and security group, domain controller, backup, admin workstation, and admin delegations and privileges. If any one of these targets is compromised, your entire Active Directory can be compromised too.

The Threats