Cybersecurity

October 17, 2019
Despite Better Detection, Careless and Malicious Insider Threats Are on the Rise premium
*Article written by Jim Hansen, VP of Products, Security and Application Management According to a 2019 Federal Cybersecurity Survey released this March by IT management software company SolarWinds, careless and malicious insiders topped the list of security threats for federal agencies. Yet, in spite of the increased threats, federal IT security pros believe they are […]
premium
qa@www.dlt.com'
October 10, 2019
Exclusive Interview: Iron Bow CTO Discusses DOD Cyber Challenges premium
This month, DLT sat down with James Ebeler, the Chief Technology Officer, Department of Defense, for Iron Bow Technologies. In this interview, James discusses the cybersecurity challenges facing our military and how Iron Bow is helping solve them with innovative solutions. DLT: Good morning, James. Thanks for joining us today for this interview. James: Good […]
premium
qa@www.dlt.com'
October 10, 2019
Global Threat Report Helps in the Fight Against Government-Focused Ransomware premium
*Article originally posted on GovCybersecurityHub here. Imagine walking into work on a Friday morning – with the weekend just one more workday away – and finding that your computer systems and data aren’t accessible. That was the reality for more than 20 cities and government agencies in Texas this past August. The culprit? A ransomware attack designed […]
premium
qa@www.dlt.com'
October 10, 2019
New CrowdStrike Report: More Cyber Criminals Adopting “Brazen” Nation-State Style Tactics premium
The first half of 2019 continued to be a busy one for cybersecurity teams and their organizations. But the nature of the adversary is changing. New insight from DLT partner, CrowdStrike, finds that attackers are “continuing to ramp up in both their brazen behavior and sophisticated means.” The mid-year 2019 CrowdStrike Falcon OverWatch Report, which […]
premium
don.maclean@www.dlt.com'
September 24, 2019
DoD Cybersecurity Strategy and Fiscal Year Spending premium
The DoD Cybersecurity Strategy https://www.fifthdomain.com/dod/2018/09/19/department-of-defense-unveils-new-cyber-strategy/ stresses nine key points. Are you aligning your spending with these objectives? 1. Using cyberspace to amplify military lethality and effectiveness Cyberspace is a battle domain; are you equipped to fight the enemy there? Do you have the tools you need to defend your systems, and support the warfighter? 2. […]
premium
don.maclean@www.dlt.com'
August 2, 2019
Defend Against Insider Threats With User Access Management premium
Every Federal IT pro knows that security threats are a top agency priority. Yet, according to the SolarWinds 2019 Cybersecurity Survey, those threats are increasing—particularly the threat of accidental data exposure from people inside the agency. According to the Survey, 56 percent of respondents said the greatest source of security threats to federal agencies is […]
premium
qa@www.dlt.com'
July 31, 2019
How Government Can Learn from the Capital One Data Breach premium
Capital One has announced that about 140,000 Social Security numbers and 80,000 linked bank accounts were compromised “in one of the biggest-ever data breaches,” affecting some 100 million individuals in the U.S. and 6 million in Canada. The FBI has charged a person with computer fraud and abuse, reports The Washington Post, citing court records. The hack, which […]
premium
qa@www.dlt.com'
July 29, 2019
From the CISO: Why Columbia University Medical Center Made the Move to Cloud-Native Cybersecurity premium
More and more organizations are making the move to cloud-based security solutions. Today, 33 percent of organizations are planning to adopt one or more security-as-a-service (SECaaS) solutions. The efficiency with which endpoint security solutions can provide protection, particularly when delivered as-a-service, is a key strategic consideration for many organizations – perhaps none more so than […]
premium
qa@www.dlt.com'
Security re:Inforced premium
It’s often said that there are two types of organizations: those that have been hacked, and those that will be – turning the conversations around security breaches from ‘what if?’ to ‘when?’. Cybersecurity is a serious, and often daunting, issue facing organizations of all kinds today. Two weeks after its Public Sector Summit, Amazon Web […]
premium
Isabella.Jacobovitz@www.dlt.com'
July 10, 2019
Combating Cyber Threats Through Transformation: A Conversation with State CIOs and CISOs premium
Although state and local technology leaders are increasingly prioritizing cybersecurity in their operations, government has a long way to go in securing critical information and systems from cyberattacks. In light of this struggle, Route Fifty, in partnership with CrowdStrike, recently hosted a webcast that showcases the work of state and local governments who have undergone […]
premium
melissa.perez@www.dlt.com'