BYOD

November 13, 2017
Are Your Endpoints a Risk? Take Control, Detect Risks, Automate Your Response premium
Getting to know the “enemy with no face” is critical to winning the cyber war. In fact, it’s the tagline from the U.S. Army’s latest cyber warrior recruitment ad. Yet, one of the biggest challenges to doing so is that most organizations have zero visibility into a significant percentage of the endpoints on their network. […]
premium
Government Tech Writer
October 12, 2016
10 Ways to Secure Big Data at Rest and In-Transit premium
Cloud computing has made collecting, storing, and processing data easier and cheaper than ever. Agencies are increasingly leveraging big data to drive actionable insights and improve cyber threat detection. Furthermore, more than 60% of agencies are using big data to reduce costs and operating expenses, writes Information Week. As the volume of big data and […]
premium
Government Writer
December 10, 2014
The 4 Biggest Government Cybersecurity Threats of 2014 (and How to Stop Them) premium
While we’ve been busy fretting about Ebola and the Islamic State, in 2014 cybersecurity trumped terrorism as the number one threat to the U.S. Despite investing billions in cybersecurity, federal, state and local agencies are struggling to keep pace with ever-evolving threats. Let’s take a look at the biggest cybersecurity threats of 2014 (so far) […]
premium
editor@acronymonline.org'
July 18, 2014
Technically News – 7/18 premium
This week in Technically News: Three Types of Cybersecurity Threats (and two employees) to Worry About Most; Survey Suggests Federal Network Complexity is Limiting Data Center Consolidation; Feds Pursue Cloud Forensics Standards; U.S. Army Grants Certificate of Networthiness (CoN) for 21 SolarWinds IT Management Products
premium
NewsJosh@www.dlt.com'
June 27, 2014
Technically News – 6/27 premium
This week in our government IT news round-up: Successful Software Projects Are No Accident; Symantec Launches Cybersecurity Program to Bridge Workforce Gap; CIA Information Chief Talks Cloud Computing, Culture Clash at Amazon Event; 5 Tips for Building BYOD Programs for Local Government; Chris LaPoint on Info Security and Automation in Government IT
premium
NewsJosh@www.dlt.com'
June 23, 2014
Evolving Government IT: A Conversation with SolarWinds’ VP of Product Management premium
SolarWinds recently published their newest public sector survey. This one focused on the complexities IT is facing as new technologies are brought into agencies. We spent some time with Chris LaPoint, SolarWinds' VP of Product Management, to discuss topics including BYOx, cloud, and security.
premium
josh.davis@www.dlt.com'
April 25, 2014
Technically News – 4/25 premium
This week in Technically News: Red Hat Touts Virtual Containers as Next Advance in Cloud Computing; In The Wake of Heartbleed, Open Source Software is Under Scrutiny; The Future of Mobility Goes Far Beyond BYOD; Severe Shortage of Tech Talent in Government, Says Report; DLT Solutions Announces CODEvolved
premium
NewsJosh@www.dlt.com'
January 20, 2014
Technically News – 1/20 premium
This week in Technically News: Top 10 Influencers in Government InfoSec; Why Cyber Security Is Not Enough: You Need Cyber Resilience; Dell Software Addresses Agency Needs in BYOD, Big Data and Security; Fixing Government Tech: Innovation Against IT Cartels and Complex Systems; Secret to BYOD: Make Security an Enabler.
premium
NewsJosh@www.dlt.com'
December 26, 2013
The Internet of Hackable Things premium
The market for wearable technology will explode over the next three years, bringing about the age of the Internet of Things and everyday cybersecurity issues like the aforementioned. And thanks to a recent Symantec finding, hackers aren’t waiting for popular adoption before using what’s already on the market to spy. You think BYOD is bad now? Hold tight.
premium
josh.davis@www.dlt.com'
September 16, 2013
Technically News – 9/16 premium
This week in Technically News: Symantec to Start Revoking Customer’s SSL Certificates by October 1; Oracle Launches Cloud Services Built for Government Agencies; Red Hat CIO Takes an Open-Source Approach to Security & BYOD; Are Federal IT Initiatives Strangling Agency Networks; 13 Cloud Computing Stats for CIOs; Cybersecurity Legislation: What’s Next.
premium
NewsJosh@www.dlt.com'