Case Study
The articulated intent, to "lead an open and transparent process to identify and promote action by appropriate stakeholders to improve the resilience of the Internet and communications ecosystem and to encourage collaboration with the goal of dramatically reducing threats perpetrated by automated and distributed attacks (e.g., botnets)" is timely and appropriate.
Added:
Data Sheet
Despite regulatory and administrative requirements, the public sector continues to be attacked and exploited by sophisticated threat actors. The fragmentation of security resources leaves federal, state and local agencies constantly fighting fires throughout the enterprise.
Added:
Data Sheet
CrowdStrike’s Falcon MalQuery is an advanced, cloud-based malware research tool that enables security professionals and researchers to quickly search a massive dataset of malware samples, validating potential risks and staying ahead of would-be attackers.
Added:
Data Sheet
The global CrowdStrike Falcon Intelligence™ team tracks adversaries of all types — nation-state, criminal, hacktivist — to provide the customized and actionable intelligence you need to stay ahead of disruptive threat actors targeting your organization.
Added:
Data Sheet
The CrowdStrike Falcon® platform was designed to be open, with a focus on providing rich APIs to allow customers and partners to benefit from its power. The Falcon platform APIs access CrowdStrike cloud data, enabling you to leverage your existing security investments and enhance your protection.
Added:
Whitepaper
The radical shift in the scale and economics of cybercrime calls for an equally radical change in how IT protects user systems. Whether it is from phishing attempts, drive-by-downloads, or malware-free intrusion techniques, endpoints are usually at the spear tip of assaults on enterprise networks.
Added:
Whitepaper
One of the fastest growing threats in cybersecurity today, ransomware is quickly becoming the favored means for cybercriminals to extract a profit from unsuspecting victims. As ransomware mushrooms with new malware variants and new ways of scamming victims, businesses can no longer afford to discount it as a consumer-only problem.
Added:
Other
The NIST Cybersecurity Framework offers federal agencies a flexible approach to securing today's multifaceted IT systems.
Added:
Webinar
More than 50% of all attacks now target the application layer, yet fewer than 10% of agencies test all of their business critical applications. Application security is more important than ever, and will grow increasingly important as agencies search to find new solutions to this mounting problem. Join Don MacLean, Chief Cyber Security Technologist at DLT Solutions, and Chris Rhondeau, Principal Solution Architect at Veracode, as they discuss how to build and test Application Security programs for government agencies in this quick on-demand webinar.
Added:
Data Sheet
Veracode’s cloud-based platform assesses applications for compliance with standard controls such as PCI, the OWASP Top 10 and the SANS Top 25. Policies can easily be customized to support specific corporate audit requirements as well as compliance requirements for SOX, HIPAA, NIST 800-53, MAS and other mandates.
Added:
Data Sheet
Veracode Web Application Scanning (WAS) offers a unified solution to discover, test and monitor all of your applications — not just the ones you know about. To manage the risk of applications in production, Veracode discovers and inventories your external web applications, then performs a lightweight, production-safe scan on thousands of sites in parallel to help you prioritize your biggest risks. For greater risk reduction, you can run authenticated deep scans on critical applications. In development, you can use Veracode WAS in staging or QA to detect vulnerabilities. In addition, Veracode offers multiple scanning technologies on a single platform, so you get unified results and analytics, plus increased accuracy.
Added:
Data Sheet
Veracode Greenlight finds security defects in your code and provides contextual remediation advice to help you fix issues in seconds, right in your IDE. Leveraging our proven, and highly accurate static engine, Veracode Greenlight offers immediate results and scales to your needs. You do not need to provision any servers or tune the engine. It simply scans in the background and provides accurate and actionable results, without taking up resources on your machine. With Veracode Greenlight, find issues early, reduce development and remediation costs, and release your code on time – at the speed of DevOps.
Added:
Data Sheet
Manage application security risk in a simple, strategic, scalable way. Find and fix software vulnerabilities in applications you build or buy.
Added:
Data Sheet
Learn how Veracode is securing today's application economy with their integrated suite of application securiy products and services.
Added:
eBook
DLT's cyber thought leadership partner, Institute for Critical Infrastructure Technology, recently released publication entitled “Next Generation Defenses for a Hyper Evolving Threat Landscape: An Anthology of ICIT Fellow Essays Volume I,” is a compilation of essays written by ICIT Fellows and Contributors including DLT Chief Cyber Technologist, Don Maclean, which offer a wide-ranging look at some of the most impactful cybersecurity defenses that should be leveraged by public and private sector organizations.
Added: