IT Perspective, Uncategorized July 11, 2019
The latest data on the progress of federal government agencies’ implementation of the Federal Information Technology Acquisition Reform Act (FITARA) was released on June 26 by the House Oversight and Reform Committee as Scorecard 8.0.
Cybersecurity July 10, 2019
Although state and local technology leaders are increasingly prioritizing cybersecurity in their operations, government has a long way to go in securing critical information and systems from cyberattacks. In light of this struggle, Route Fifty, in partnership with CrowdStrike, recently hosted a webcast that showcases the work of state and local governments who have undergone a transformation in cybersecurity protocols – and the challenges they continue to face.
Cybersecurity December 3, 2018
In a recent blog post, DLT Chief Technology Officer David Blankenhorn shared his insight on DLT’s evolution to a government solutions aggregator:
Cybersecurity November 14, 2018
Benefits and social security fraud are a huge cost to taxpayers. In 2016, the White House estimated these losses at $144 billion. Fraud can take many forms from making false statements on a social security claim, misuse of benefits by a family member or friend, altering claims, duplicate billing for the same service, embezzlement, and so on.
Cybersecurity November 8, 2018
City of Fort Worth, TX, Protects Sprawling IT Environment with Powerful And Innovative Endpoint Security
Cybersecurity September 27, 2018
2018 marks the 15th year of the National Cybersecurity Awareness Month, a government/industry effort – observed every October – that works to ensure every American has the resources they need to “be safer and more secure online” and educating everyone about the roles they play in helping to safeguard the internet.
Cybersecurity July 11, 2018
Each year, the cyber security community puts out new statistics on data breaches. While certain sectors face a different mix of threats, many of them evolving year-after-year, once constant remains – the deficit between the time a system is compromised and the time that breach is discovered.