March 20, 2019
Data Security: A Closer Look at DLP premium
Earlier this month, I wrote about the Zero Trust model for security. As I proceed through these daily blogs, I find many of them complement the ZT model; data security is one. Outside the IOT world, the goal of cybersecurity is to protect data. The Zero Trust model recognizes this and focuses on keeping security […]
March 15, 2019
Endpoint Security: It’s a Whole New World premium
Once upon a time, endpoint security was just a hall monitor: it watched for known bad files identified with a simple signature and sent you an alert when the file was blocked. To be safe, it would scan every machine daily, an intrusive activity that slowed down machines, and sped up the heart rates of […]
February 28, 2019
Security = Fundamentals + Innovation premium
Every security professional knows that the adversary has the advantage. Security professionals have to find every vulnerability (good luck with that) and remediate it, and the enemy only needs to find one vulnerability and exploit it. This asymmetry underlies their economic advantage: finding one vulnerability gives access to a huge number of systems. In addition, for […]
February 14, 2019
How to Make Every Agency Employee a Security Advocate premium
The rising numbers of data breaches should come as no surprise to federal IT security pros who work every day to ensure agency information is secure. However, these breaches may not be something a federal IT team can prevent on its own. According to the most recent SolarWinds Federal Cybersecurity Survey, more than 50% of […]
November 16, 2017
7 Must-Have Elements of your Agency’s Incident Response Plan premium
DLT partner, Symantec, has put together a list of seven items you must add to any incident response plan. Here’s how it translates to government agencies. 1. Have a Workable Plan An incident response plan is your roadmap for responding to a cybersecurity attack. In this NextGov interview with Symantec’s Robert Myles and DLT’s Don […]
Government Tech Writer
September 19, 2017
[Survey] Regulations, Careless Insiders, and IT Modernization Complicate Federal Cybersecurity premium
Federal IT pros are facing “Herculean tasks” when it comes to security challenges, a new survey conducted by DLT partner, SolarWinds, reveals. Featuring insights from 200 civilian and Department of Defense (DoD) IT decision-makers, the survey explores the security challenges faced by public sector IT professionals, quantifies the sources and types of IT security threats, […]
April 27, 2017
Filling the Gaps in Open Source Application Delivery premium
Open source application development and delivery tools provide compelling value for developers and often fill holes that commercial tools, with their relatively fixed function set, can’t fill. But a new report from Forrester, suggests that open source tools can’t do it all. After surveying 150 U.S. application development and IT professionals, Forrester found that open […]
March 6, 2017
Opening New Possibilities for Government IT in 2017 premium
For the past few years, the word “open” has been a cornerstone of government IT. Not open in terms of security, of course—that would never do—but open in relation to technology that allows for greater agility and flexibility, as outlined in the Federal Source Code Policy. In 2017, the conversation around openness has expanded to […]
February 27, 2017
8 Principles for Securing DevOps premium
Although still in its infancy in the public sector, making the shift to DevOps methodologies is starting to catch on with many government agencies, including the U.S. Citizenship and Immigration Services, the EPA, and Nuclear Regulatory Commission. As you may know, with DevOps, IT tasks and application deployment that would normally take months or years, […]
Government Tech Writer
January 10, 2017
DHS Designates New Protections for U.S. Election Infrastructure premium
On the same day that U.S. intelligence agencies issued a non-classified report citing that Russian state-sponsored influence campaigns sought to “undermine public faith in the U.S. democratic process…” using a blend of covert activity (such as cyber activity) with overt efforts (state-funded media, paid trolls, etc.) the Department of Homeland Security took steps to protect […]
Government Writer