Home on the Tech Data Cyber Range
I recently had the opportunity to visit an amazing new facility—the Cyber Range at Tech Data—and got to meet the truly exceptional people who make it happen. The facility has many purposes, stemming from the powerful sense of mission that drives the staff.
Cybersecurity Has a Posse
At RSA this year, Chris Krebs gave an important talk: “Cybersecurity Has a Posse” where he stressed the importance of collaboration between government and industry to fight the cybersecurity war. He started by pointing out that his agency, Cybersecurity and Infrastructure Security Agency (CISA) is an “all-source” group. He meant that CISA collects threat information from sources all over the world, including government agencies, private industry, and more. Krebs’ group consolidates that information and disseminates it – daily – to security professionals across all industries.
Remote Working in the Time of COVID-19: These Steps Are Key to Cybersecurity
With the designation of the COVID-19 disease as a global pandemic hotly followed by a declaration of a national emergency by President Trump, the American way of life shifted dramatically – with the home office becoming a new reality for millions.
Unfortunately, the rise in the global remote workforce puts more pressure on IT teams, network architectures, and even equipment. But there are also very real cybersecurity challenges to consider.
Troubleshooting Your Office 365 Environment
By Brandon Shopp, VP, Product Strategy, SolarWinds
Is unnecessary complexity making Office 365 monitoring a headache for your agency? A new presidential mandate requires federal agencies to “transform and modernize” their IT systems, with the goal of creating a more streamlined, cost-efficient, and secure IT environment.
How AI & ML Combat Cyberattacks
This is a repost of a blog originally posted to GovLoop here.
This blog post is an excerpt from our new report, How Artificial Intelligence Combats Fraud and Cyberattack, download the full report here.
Introducing GovCybersecurityHub – Your Go-To Resource for Staying Informed
The security of public sector networks is under attack. Each day security and IT professionals work hard to defend the integrity of mission-critical data and systems against increasingly frequent and complex cyberattacks.
Staying informed is critical to staying ahead.
That’s great, but there are literally dozens of cyber news outlets, journals, and bloggers to follow. Security leaders and practitioners don’t have time to filter what’s urgent and relevant to their organizations. That’s why we’ve created GovCybersecurityHub.
Despite Better Detection, Careless and Malicious Insider Threats Are on the Rise
*Article written by Jim Hansen, VP of Products, Security and Application Management
Exclusive Interview: Iron Bow CTO Discusses DOD Cyber Challenges
This month, DLT sat down with James Ebeler, the Chief Technology Officer, Department of Defense, for Iron Bow Technologies. In this interview, James discusses the cybersecurity challenges facing our military and how Iron Bow is helping solve them with innovative solutions.
DLT: Good morning, James. Thanks for joining us today for this interview.
James: Good morning, happy to be here.
DLT: Fantastic, let’s dive right in. First, can you tell us about your role at Iron Bow Technologies?
New CrowdStrike Report: More Cyber Criminals Adopting “Brazen” Nation-State Style Tactics
The first half of 2019 continued to be a busy one for cybersecurity teams and their organizations. But the nature of the adversary is changing.
New insight from DLT partner, CrowdStrike, finds that attackers are “continuing to ramp up in both their brazen behavior and sophisticated means.”
Global Threat Report Helps in the Fight Against Government-Focused Ransomware
*Article originally posted on GovCybersecurityHub here.