Top 5 Reasons to Migrate Your Oracle Licenses
Ever wonder what to do with your old, out-of-date software licenses from Oracle? Technology is constantly improving and new programs are being developed all the time. Some of those old programs are combined with others to form new product bundles, some are upgraded and repackaged, and some are simply retired and replaced by new programs. Fortunately, the license migration is a way to make sure that your licenses remain useful and valuable over time as technologies and business needs evolve, and facilitates effective license management by you, the end user.
The State of Phishing Cyber Attacks: An Infographic
Though it's the oldest hacking trick in the book, phishing cyber attacks are still a nightmare for cybersecurity. We created an infographic that offers a look at what phishing attacks are, how they're launched, tips to defend yourself, and examples.
Government Social Media Use – A Few Tips for Employees About Social Media Security
Social media outlets like Twitter, Facebook, Tumblr, and LinkedIn are great because they allow us to maintain friends and connections across the country without leaving our homes and offices. The downside of social media is the casualty with which we use it.
Akamai Government Forum 2014: Threat Landscape
The Akamai Government Forum 2014 event helped customers dive deep into the efficiencies of moving to the cloud and innovations in cybersecurity. Below are the two questions I found most interesting along with summarized answers given by R.H. and Mike.
Beware: Neighborhood Cybersecurity Watch In Force
Last week, I attended the AFCEA NOVA chapter luncheon where the guest speaker was Brigadier General (retired) Gregory J. Touhill, the Deputy Assistant Secretary for Cybersecurity Operation and Programs at the Department of Homeland Security (DHS). In his insightful and practical message, Mr. Tourhill demonstrated that protecting our critical infrastructure is a team effort that requires vigilance and broad participation.
Aneesh Chopra Discuses Securing Data to Solve Problems
Aneesh Chopra, the first and former Chief Technology Officer of the United States, gave one of this year's GovDefenders keynotes. During his presentation – The Promise of Open Innovation: Securing Data to Solve Problems – Aneesh took time to talk about his work during his years in President Obama’s administration within the context of security.
Continuous Monitoring Risk Management Frameworks Explained by NIST’s Dr. Ross
Dr. Ross’ GovDefenders keynote focused on continuous monitoring, a topic NIST has been working with for over eight years. In his presentation, he zeroes in on two big questions: What is continuous monitoring and how does it fit into an agency’s risk management program?
Meeting the Cybersecurity Challenge
John Slye’s GovDefenders keynote, “Meeting the Cybersecurity Challenge,” was one of the most watched presentations during this year’s annual virtual event. In it, he breaks down what federal public sector agencies are doing to combat cyber threats.
Managing the Unpredictable Human Element of Cybersecurity: A SolarWinds Infographic
SolarWinds recently published an interesting infographic on cybersecurity based on a series of surveys they did with the federal IT community.
Critical Infrastructure: Principles & Activities to Achieve a Strong Cybersecurity Posture
We’ve posted the GovDefenders panel on YouTube. Moderated by DLT Solutions’ Chief Technology Officer Van Ristau, the panel featured Ken Durbin, Continuous Monitoring Practice Manager, Symantec; Paul Christman, Vice President, Dell Software Public Sector; and Wallace Sann, Regional Vice President – Systems Engineering & Federal Chief Technology Officer, ForeScout.