7 Free eBooks that Demystify Public Sector IT Trends
Who doesn’t love a freebie! But what about a freebie that can actually help you make better decisions about your technology purchases – whether you’re a CIO, program manager, IT manager or end user.
DLT has assembled a large selection of eBooks that set about to demystify technology concepts – from cloud computing to continuous monitoring, and more. We help you go beyond lofty concepts and get down to the nitty gritty of how your agency can find and make the best of its investments.
As DoD Eyes Internet of Things for New Uses Cases, Security Concerns Remain
The “Internet of Things” isn’t exactly a new concept, Kevin Ashton coined the term the Internet of Things as far back as 1999. Now, 15 years later, the Department of Defense (DoD) is eager to exploit it.
What is the Internet of Things?
Achieve Cybersecurity Peace of Mind for your Agency – One Day Only!
There’s no getting away from the number one threat to the U.S this year – cybercrime.
So you may want to clear your calendar for the Symantec Government Symposium. This ever popular one-day event takes place on April 15, 2015, at the Walter E. Washington Convention Center in Washington, D.C.
Denial of Service Attacks Rise (“Internet of Things” Vulnerable)
With all the noise and hubbub around insider threats and data hacks, it’s easy to ignore that other threats persist. Most notably, denial-of-service (DDoS) attacks. DDoS occur when cyber criminals make a machine or network resource unavailable to its intended users.
Feds are Ignoring Insider Threats to Cybersecurity, New Survey Reveals
One of the biggest threats to the security of government data and systems doesn’t come from rogue hackers or nations, it comes from within. As we revealed in The 4 Biggest Cybersecurity Threats of 2014, the careless and untrained government employees represent the top source of security threats to federal agencies.
How to Implement Continuous Monitoring and improve your Agency’s Security Posture
Security hazards are a fact of life and the public sector is a leading target for attacks. Despite progress and increased risk awareness, government hacks and security breaches are skyrocketing. There were almost 61,000 attacks on the federal government in 2013.
IPv6 - A Stealthy Threat within the World’s Most Secure Networks?
The 4 Biggest Government Cybersecurity Threats of 2014 (and How to Stop Them)
While we’ve been busy fretting about Ebola and the Islamic State, in 2014 cybersecurity trumped terrorism as the number one threat to the U.S.
Despite investing billions in cybersecurity, federal, state and local agencies are struggling to keep pace with ever-evolving threats.
Let’s take a look at the biggest cybersecurity threats of 2014 (so far) and steps the federal as well as state and local government can take to stop them.
The Government Workforce
States Remain Vulnerable to Catastrophic Email Loss and Non-Compliance
Disaster recovery, governance and business continuity are a top priority for America’s cities and counties in 2015, behind only cybersecurity, open government and IT staffing. That’s according to the latest survey data from the Center for Digital Government – and with good reason. Keeping up with state and local guidelines and regulations for data integrity and the protection and availability of public records is exhausting.
Compliance Begins with People and Processes, Ends with Software
All too often, federal IT personnel misconstrue software as being able to make their agency compliant with various regulations. It can’t – at least not by itself.