March 28, 2019
Incident Response & Forensics premium
Every government organization has been the victim of a cybersecurity incident. These can range from mundane incidents such as a user leaving their desk without locking their screen, up to a major breach such as the OPM hack in which hackers stole comprehensive and confidential information on millions of government employees and contractors. Security personnel, […]
March 21, 2019
The Importance of Mobile Security premium
Cell phones, tablets, wearables, and other mobile devices dominate our lives. I personally bring my trusty iPad to everywhere, and, like everyone else, have my phone with me at all times. The biggest attack surface for any enterprise, then, may well be these devices. How can we assess the threats? What are the components in […]
March 20, 2019
Data Security: A Closer Look at DLP premium
Earlier this month, I wrote about the Zero Trust model for security. As I proceed through these daily blogs, I find many of them complement the ZT model; data security is one. Outside the IOT world, the goal of cybersecurity is to protect data. The Zero Trust model recognizes this and focuses on keeping security […]
March 15, 2019
Endpoint Security: It’s a Whole New World premium
Once upon a time, endpoint security was just a hall monitor: it watched for known bad files identified with a simple signature and sent you an alert when the file was blocked. To be safe, it would scan every machine daily, an intrusive activity that slowed down machines, and sped up the heart rates of […]
February 28, 2019
Security = Fundamentals + Innovation premium
Every security professional knows that the adversary has the advantage. Security professionals have to find every vulnerability (good luck with that) and remediate it, and the enemy only needs to find one vulnerability and exploit it. This asymmetry underlies their economic advantage: finding one vulnerability gives access to a huge number of systems. In addition, for […]
February 14, 2019
How to Make Every Agency Employee a Security Advocate premium
The rising numbers of data breaches should come as no surprise to federal IT security pros who work every day to ensure agency information is secure. However, these breaches may not be something a federal IT team can prevent on its own. According to the most recent SolarWinds Federal Cybersecurity Survey, more than 50% of […]
November 16, 2017
7 Must-Have Elements of your Agency’s Incident Response Plan premium
DLT partner, Symantec, has put together a list of seven items you must add to any incident response plan. Here’s how it translates to government agencies. 1. Have a Workable Plan An incident response plan is your roadmap for responding to a cybersecurity attack. In this NextGov interview with Symantec’s Robert Myles and DLT’s Don […]
Government Tech Writer
September 19, 2017
[Survey] Regulations, Careless Insiders, and IT Modernization Complicate Federal Cybersecurity premium
Federal IT pros are facing “Herculean tasks” when it comes to security challenges, a new survey conducted by DLT partner, SolarWinds, reveals. Featuring insights from 200 civilian and Department of Defense (DoD) IT decision-makers, the survey explores the security challenges faced by public sector IT professionals, quantifies the sources and types of IT security threats, […]
April 27, 2017
Filling the Gaps in Open Source Application Delivery premium
Open source application development and delivery tools provide compelling value for developers and often fill holes that commercial tools, with their relatively fixed function set, can’t fill. But a new report from Forrester, suggests that open source tools can’t do it all. After surveying 150 U.S. application development and IT professionals, Forrester found that open […]
March 6, 2017
Opening New Possibilities for Government IT in 2017 premium
For the past few years, the word “open” has been a cornerstone of government IT. Not open in terms of security, of course—that would never do—but open in relation to technology that allows for greater agility and flexibility, as outlined in the Federal Source Code Policy. In 2017, the conversation around openness has expanded to […]