So you’ve got all sorts of endpoint controls and continuous monitoring solutions in place across your agency’s IT environment. Great! Sounds like you’ve got a good security posture going on.
But is your data actually as secure as you think it is? Unfortunately, not.
If there’s one thing that cyberattacks on government systems have taught us in the past few years is that the biggest threat doesn’t come from rogue hackers or nations, it comes from within.
Who doesn’t love a freebie! But what about a freebie that can actually help you make better decisions about your technology purchases – whether you’re a CIO, program manager, IT manager or end user.
DLT has assembled a large selection of eBooks that set about to demystify technology concepts – from cloud computing to continuous monitoring, and more. We help you go beyond lofty concepts and get down to the nitty gritty of how your agency can find and make the best of its investments.
“Responsibility for secure open software is, well, complicated,” writes Government Computer News. It’s not just complicated; it’s also perhaps one of the most misunderstood aspects of open source software development.
You’ve no doubt read that open source software (OSS) is more secure than proprietary software because the code is genuinely hardened thanks to reviewers in the open source community who have tested it, tried to break it, and then fixed the problems they uncover.
Proof of performance is a key criterion for any government decision maker when reviewing potential vendors and bidders. One such “proof” is recognition from industry analysts, and perhaps the most sought after of these is to be positioned (and ranked highly) in Gartner’s Magic Quadrant reports.
If you’re situated within the Washington, D.C. metro area or surrounding states, mark your calendar for the 2015 Informatica Government Summit to be held on April 23, 2015 at the Grand Hyatt Washington Hotel.
With all the noise and hubbub around insider threats and data hacks, it’s easy to ignore that other threats persist. Most notably, denial-of-service (DDoS) attacks. DDoS occur when cyber criminals make a machine or network resource unavailable to its intended users.
With more and more software and services being offloaded to the cloud and the surge in big government data, the speed of your storage still matters – very much.
Driven by potentially compelling outcomes, big government data is growing. A 2013 study of federal IT officials by the TechAmerica Foundation, for example, found that big data delivers many benefits, including: