Melissa Perez

December 3, 2018
CrowdStrike Expands Public Sector Footprint as DLT Reinvests in Partner Ecosystem premium
In a recent blog post, DLT Chief Technology Officer David Blankenhorn shared his insight on DLT’s evolution to a government solutions aggregator: “At DLT, we are doubling down on our key capabilities. DLT has had a partner ecosystem for many years, but we are now reinvesting in that ecosystem. We are reinvesting in our market […]
November 14, 2018
See Beyond the Noise: How Nuix Uncovers and Prevents Entitlement Fraud premium
Benefits and social security fraud are a huge cost to taxpayers. In 2016, the White House estimated these losses at $144 billion. Fraud can take many forms from making false statements on a social security claim, misuse of benefits by a family member or friend, altering claims, duplicate billing for the same service, embezzlement, and […]
November 8, 2018
City of Fort Worth, TX, Protects Sprawling IT Environment with Powerful And Innovative Endpoint Security premium
City of Fort Worth, TX, Protects Sprawling IT Environment with Powerful And Innovative Endpoint Security The 2018 Verizon Data Breach Investigations Report (DBIR) showed that the public sector is one of the top three most exploited sectors in the United States, with more than 300 reported cyber breaches in 2017 alone.  Any cyber attack on […]
September 27, 2018
DLT Expands Industry-Leading Cybersecurity Portfolio to Help Government Remain Secure premium
2018 marks the 15th year of the National Cybersecurity Awareness Month, a government/industry effort – observed every October – that works to ensure every American has the resources they need to “be safer and more secure online” and educating everyone about the roles they play in helping to safeguard the internet. While many of the […]
July 11, 2018
Limited Resources? A Security Intelligence Platform Can Do the Heavy Lifting for You premium
Each year, the cyber security community puts out new statistics on data breaches. While certain sectors face a different mix of threats, many of them evolving year-after-year, once constant remains – the deficit between the time a system is compromised and the time that breach is discovered. For example, this year’s Verizon Data Breach Investigations […]