DLT’s Don Maclean Takes an In-Depth Look at CDM

To improve the federal government’s cybersecurity posture, the Department of Homeland Security created the Continuous Diagnostics and Mitigation (CDM) program.  On September 6, the House of Representatives voted to codify CDM, and barely two weeks later, the White House’s National Cyber Strategy assigned to DHS still more authority over cybersecurity in the United States.  What’s more, government contractors are winning 9- and 10-figure CDM contracts, so it’s clear that CDM’s time has come.

DLT Expands Industry-Leading Cybersecurity Portfolio to Help Government Remain Secure

2018 marks the 15th year of the National Cybersecurity Awareness Month, a government/industry effort – observed every October – that works to ensure every American has the resources they need to “be safer and more secure online” and educating everyone about the roles they play in helping to safeguard the internet.

Cybersecurity Month: Closing the Gaps in U.S. Government Cybersecurity Resilience

In a year in which we’ve witnessed the carnage of the Atlanta ransomware attack and U.S. government agencies remain on high alert about possible Russian cyber-attacks against U.S. critical infrastructure and electoral systems, new research shows that the cybersecurity landscape is evolving quicker than agencies can respond.

Federal Agencies are Playing a Game of Hope with Two-Factor Authentication

Shortly after the federal government suffered it’s largest and costliest data breach ever at the Office of Personnel Management (OPM), a post-mortem analysis found that the breach was entirely preventable, and the exfiltration of security clearance files of government employees and contractors could have been prevented through the implementation of two-factor authentication for remote log-ons.

What Agencies Need to Consider When Updating Password Protocols in 2018

Movies and TV would have us believe that data breaches are long, hard-fought battles between the good guy and the bad guy—and the bad guy wins. That could not be further from reality. Hackers are opportunistic. They want to spend as little time as possible getting into the system, getting what they need, getting out, and exploiting it as fast as possible.