White House Cybersecurity Strategy: The Essence
The “National Cyber Strategy”, released recently by the White House, offers a broad blueprint for America’s approach to cybersecurity. Let’s look its four “pillars”, and their key elements.
CrowdStrike Expands Public Sector Footprint as DLT Reinvests in Partner Ecosystem
In a recent blog post, DLT Chief Technology Officer David Blankenhorn shared his insight on DLT’s evolution to a government solutions aggregator:
Cyber Hygiene: Five Ways to Make Your Bed
“Cyber Hygiene”: you know the term, but what does it really mean? Some say it is an ill-defined set of practices for individuals to follow (or ignore). Others say it is a measure of an organization’s overall commitment to security. Still, others think of “cyber hygiene” as simple, readily available technologies and practices for cybersecurity.
See Beyond the Noise: How Nuix Uncovers and Prevents Entitlement Fraud
Benefits and social security fraud are a huge cost to taxpayers. In 2016, the White House estimated these losses at $144 billion. Fraud can take many forms from making false statements on a social security claim, misuse of benefits by a family member or friend, altering claims, duplicate billing for the same service, embezzlement, and so on.
City of Fort Worth, TX, Protects Sprawling IT Environment with Powerful And Innovative Endpoint Security
City of Fort Worth, TX, Protects Sprawling IT Environment with Powerful And Innovative Endpoint Security
How Can You Protect the Mid-Terms and Secure Election Networks in Minutes?
With the mid-term elections looming, protecting the integrity of our most basic democratic right has become a matter of critical importance. According to the Electronic Frontier Foundation, a nonprofit organization dedicated to defending civil liberties in a digital world, election security remains just as vulnerable as in 2016 and encourages Secretaries of State to be pressed to do their job and increase security before voters cast their ballo
DLT’s Don Maclean on Today’s Cyber Challenges
This month, Symantec caught up with Don Maclean, Chief Cyber Security Technologist, DLT, to get his thoughts on today’s top cyber challenges. You can hear more from Don at the Symantec Government Symposium on Oct. 30, as he shares his perspective on the “Aligning Cyber Priorities and Modernization Policies” panel.
As Government Cloud Adoption Reaches Inflection Point, Cyber Teams Must Prepare
Cloud adoption among government agencies is reaching an inflection point. Driven by the cloud’s cost-efficiencies and ability to offer an improved citizen experience, faster delivery of mission capabilities, agile development, and scale applications up and down, much of the initial reticence about cloud models is dissipating.
DLT’s Don Maclean Takes an In-Depth Look at CDM
To improve the federal government’s cybersecurity posture, the Department of Homeland Security created the Continuous Diagnostics and Mitigation (CDM) program. On September 6, the House of Representatives voted to codify CDM, and barely two weeks later, the White House’s National Cyber Strategy assigned to DHS still more authority over cybersecurity in the United States. What’s more, government contractors are winning 9- and 10-figure CDM contracts, so it’s clear that CDM’s time has come.
4 Ways our Elections are Under Threat (And What We Can Do About It)
Fear of digital sabotage of the mid-term elections has become the biggest cybersecurity talking point of 2018. With the latest election security bill stalled in Congress and suspicions that Russia (and possibly others) are still seeking to sow divisions among the U.S. electorate, voters and political organizations are right to be worried.