Cybersecurity

August 2, 2019
Defend Against Insider Threats With User Access Management premium
Every Federal IT pro knows that security threats are a top agency priority. Yet, according to the SolarWinds 2019 Cybersecurity Survey, those threats are increasing—particularly the threat of accidental data exposure from people inside the agency. According to the Survey, 56 percent of respondents said the greatest source of security threats to federal agencies is […]
premium
qa@www.dlt.com'
July 31, 2019
How Government Can Learn from the Capital One Data Breach premium
Capital One has announced that about 140,000 Social Security numbers and 80,000 linked bank accounts were compromised “in one of the biggest-ever data breaches,” affecting some 100 million individuals in the U.S. and 6 million in Canada. The FBI has charged a person with computer fraud and abuse, reports The Washington Post, citing court records. The hack, which […]
premium
qa@www.dlt.com'
July 29, 2019
From the CISO: Why Columbia University Medical Center Made the Move to Cloud-Native Cybersecurity premium
More and more organizations are making the move to cloud-based security solutions. Today, 33 percent of organizations are planning to adopt one or more security-as-a-service (SECaaS) solutions. The efficiency with which endpoint security solutions can provide protection, particularly when delivered as-a-service, is a key strategic consideration for many organizations – perhaps none more so than […]
premium
qa@www.dlt.com'
Security re:Inforced premium
It’s often said that there are two types of organizations: those that have been hacked, and those that will be – turning the conversations around security breaches from ‘what if?’ to ‘when?’. Cybersecurity is a serious, and often daunting, issue facing organizations of all kinds today. Two weeks after its Public Sector Summit, Amazon Web […]
premium
Isabella.Jacobovitz@www.dlt.com'
July 10, 2019
Combating Cyber Threats Through Transformation: A Conversation with State CIOs and CISOs premium
Although state and local technology leaders are increasingly prioritizing cybersecurity in their operations, government has a long way to go in securing critical information and systems from cyberattacks. In light of this struggle, Route Fifty, in partnership with CrowdStrike, recently hosted a webcast that showcases the work of state and local governments who have undergone […]
premium
melissa.perez@www.dlt.com'
March 29, 2019
How to Best Manage Your System’s Assets premium
Many government agencies, particularly large agencies, face enormous obstacles in simply compiling and inventory of the software and hardware under in their system. The difficulty is understandable: I know of one agency responsible for 220,000 makes and models of medical devices (note that this number refers to “makes and models” only. The actual number of […]
premium
don.maclean@www.dlt.com'
March 28, 2019
Incident Response & Forensics premium
Every government organization has been the victim of a cybersecurity incident. These can range from mundane incidents such as a user leaving their desk without locking their screen, up to a major breach such as the OPM hack in which hackers stole comprehensive and confidential information on millions of government employees and contractors. Security personnel, […]
premium
don.maclean@www.dlt.com'
March 27, 2019
The Art of Access Management premium
Identity and Access Management (IAM) is the art and science of ensuring that someone is who they say claim to be. This ensures that they have the correct level of access to systems and data – enough to do their job, but no more. IAM systems cover a wide range of features, but typically include: […]
premium
don.maclean@www.dlt.com'
March 26, 2019
Common Compliance Conundrums premium
Cybersecurity assessment initiatives and frameworks abound in the US government, the most important being the Federal Information Systems Management Act (FISMA), passed in 2002.  The law’s broad scope included a mandate to the US National Institute of Standards and Technology (NIST), charging it to create methods and standards to assess and optimize the cybersecurity posture […]
premium
don.maclean@www.dlt.com'
March 25, 2019
Contingency Planning Isn’t Fun and Games. But Should it Be? premium
“Hope for the best, plan for the worst”. This ancient principle still applies, especially for systems with high availability requirements. Principles are easy to quote, but how does an organization implement them effectively? In its vast compendium of requisite security controls, NIST has created an entire category of requirements for contingency planning. Federal agencies are […]
premium
don.maclean@www.dlt.com'