Cybersecurity

February 14, 2019
How to Make Every Agency Employee a Security Advocate premium
The rising numbers of data breaches should come as no surprise to federal IT security pros who work every day to ensure agency information is secure. However, these breaches may not be something a federal IT team can prevent on its own. According to the most recent SolarWinds Federal Cybersecurity Survey, more than 50% of […]
premium
qa@dlt.com'
February 7, 2019
Analysis: DHS Domain Name System Breach Directive premium
On January 22, the Department of Homeland Security (DHS) issued a directive to government agencies in response to breaches of the Domain Name System (DNS). The attackers used stolen credentials to alter DNS entries and steal certificates used for encryption and decryption. In combination, these actions let the attackers redirect sensitive traffic to their own […]
premium
don.maclean@dlt.com'
Video: Modernizing Data Protection in the Public Sector premium
Expert Panel: The Challenges and Opportunities for Modernizing Data Protection As online data has become ubiquitous, managing that data has become as important an endeavor as amassing and storing it. A host of issues surround data management, not the least of which is security. But many others loom as data increases exponentially both in size […]
premium
qa@dlt.com'
January 16, 2019
BYOx for the Most Secure Spaces premium
Article written by Jim Hansen, VP of Products, Security, SolarWinds Earlier this year, the Department of Defense (DoD) released a policy memo stating that DoD personnel—as well as contractors and visitors to DoD facilities—may no longer carry mobile devices in areas specifically designated for “processing, handling, or discussion of classified information.” For federal IT pros, managing […]
premium
qa@dlt.com'
December 28, 2018
White House Cybersecurity Strategy: The Essence premium
The “National Cyber Strategy”, released recently by the White House, offers a broad blueprint for America’s approach to cybersecurity.  Let’s look its four “pillars”, and their key elements. 1. Protecting the American People, Homeland, and the American Way of Life Such a broad mandate obviously covers a lot of ground, but some key items to […]
premium
don.maclean@dlt.com'
December 3, 2018
CrowdStrike Expands Public Sector Footprint as DLT Reinvests in Partner Ecosystem premium
In a recent blog post, DLT Chief Technology Officer David Blankenhorn shared his insight on DLT’s evolution to a government solutions aggregator: “At DLT, we are doubling down on our key capabilities. DLT has had a partner ecosystem for many years, but we are now reinvesting in that ecosystem. We are reinvesting in our market […]
premium
melissa.perez@dlt.com'
November 26, 2018
Cyber Hygiene: Five Ways to Make Your Bed premium
“Cyber Hygiene”:  you know the term, but what does it really mean? Some say it is an ill-defined set of practices for individuals to follow (or ignore). Others say it is a measure of an organization’s overall commitment to security.  Still, others think of “cyber hygiene” as simple, readily available technologies and practices for cybersecurity. […]
premium
don.maclean@dlt.com'
November 14, 2018
See Beyond the Noise: How Nuix Uncovers and Prevents Entitlement Fraud premium
Benefits and social security fraud are a huge cost to taxpayers. In 2016, the White House estimated these losses at $144 billion. Fraud can take many forms from making false statements on a social security claim, misuse of benefits by a family member or friend, altering claims, duplicate billing for the same service, embezzlement, and […]
premium
melissa.perez@dlt.com'
November 8, 2018
City of Fort Worth, TX, Protects Sprawling IT Environment with Powerful And Innovative Endpoint Security premium
City of Fort Worth, TX, Protects Sprawling IT Environment with Powerful And Innovative Endpoint Security The 2018 Verizon Data Breach Investigations Report (DBIR) showed that the public sector is one of the top three most exploited sectors in the United States, with more than 300 reported cyber breaches in 2017 alone.  Any cyber attack on […]
premium
melissa.perez@dlt.com'
October 25, 2018
How Can You Protect the Mid-Terms and Secure Election Networks in Minutes? premium
With the mid-term elections looming, protecting the integrity of our most basic democratic right has become a matter of critical importance.  According to the Electronic Frontier Foundation, a nonprofit organization dedicated to defending civil liberties in a digital world, election security remains just as vulnerable as in 2016 and encourages Secretaries of State to be […]
premium
andre.jones@dlt.com'