Other
The NIST Cybersecurity Framework offers federal agencies a flexible approach to securing today's multifaceted IT systems. 
Added:
Webinar
More than 50% of all attacks now target the application layer, yet fewer than 10% of agencies test all of their business critical applications. Application security is more important than ever, and will grow increasingly important as agencies search to find new solutions to this mounting problem. Join Don MacLean, Chief Cyber Security Technologist at DLT Solutions, and Chris Rhondeau, Principal Solution Architect at Veracode, as they discuss how to build and test Application Security programs for government agencies in this quick on-demand webinar.
Added:
Data Sheet
Veracode’s cloud-based platform assesses applications for compliance with standard controls such as PCI, the OWASP Top 10 and the SANS Top 25. Policies can easily be customized to support specific corporate audit requirements as well as compliance requirements for SOX, HIPAA, NIST 800-53, MAS and other mandates.
Added:
Data Sheet
Veracode Web Application Scanning (WAS) offers a unified solution to discover, test and monitor all of your applications — not just the ones you know about. To manage the risk of applications in production, Veracode discovers and inventories your external web applications, then performs a lightweight, production-safe scan on thousands of sites in parallel to help you prioritize your biggest risks. For greater risk reduction, you can run authenticated deep scans on critical applications. In development, you can use Veracode WAS in staging or QA to detect vulnerabilities. In addition, Veracode offers multiple scanning technologies on a single platform, so you get unified results and analytics, plus increased accuracy.
Added:
Data Sheet
Veracode Greenlight finds security defects in your code and provides contextual remediation advice to help you fix issues in seconds, right in your IDE. Leveraging our proven, and highly accurate static engine, Veracode Greenlight offers immediate results and scales to your needs. You do not need to provision any servers or tune the engine. It simply scans in the background and provides accurate and actionable results, without taking up resources on your machine. With Veracode Greenlight, find issues early, reduce development and remediation costs, and release your code on time – at the speed of DevOps.
Added:
Data Sheet
Manage application security risk in a simple, strategic, scalable way. Find and fix software vulnerabilities in applications you build or buy.
Added:
Data Sheet
Learn how Veracode is securing today's application economy with their integrated suite of application securiy products and services.
Added:
eBook
DLT's cyber thought leadership partner, Institute for Critical Infrastructure Technology, recently released publication entitled “Next Generation Defenses for a Hyper Evolving Threat Landscape: An Anthology of ICIT Fellow Essays Volume I,” is a compilation of essays written by ICIT Fellows and Contributors including DLT Chief Cyber Technologist, Don Maclean, which offer a wide-ranging look at some of the most impactful cybersecurity defenses that should be leveraged by public and private sector organizations.
Added:
Webinar
Experts from DLT, AWS and Evident.io exchanged perspectives on what NIST 800-53 compliance means for government agencies and private organizations alike.
Added:
Whitepaper
McAfee Labs is one of the world’s leading sources for threat research, threat intelligence, and cybersecurity thought leadership. This report from Intel Security provides both near- and long-term views of our cyber security future.
Added:
Webinar
As agencies increasingly place critical data and operations into the Cloud, they must take appropriate measures to protect these assets from the growing threats of the online world. Watch the on-demand webcast to learn how to keep your critical data secure.
Added: