What’s this Data Masking All about Anyway?
So you’ve got all sorts of endpoint controls and continuous monitoring solutions in place across your agency’s IT environment. Great! Sounds like you’ve got a good security posture going on.
But is your data actually as secure as you think it is? Unfortunately, not.
If there’s one thing that cyberattacks on government systems have taught us in the past few years is that the biggest threat doesn’t come from rogue hackers or nations, it comes from within.
How to Overcome the Challenges of Implementing OpenStack
We’ve been touting the benefits of OpenStack® since its incubatory stages as a joint project between RackSpace and NASA. But what is OpenStack and why do 84% of enterprises plan to deploy it as the platform of choice for the cloud?
What is OpenStack?
7 Free eBooks that Demystify Public Sector IT Trends
Who doesn’t love a freebie! But what about a freebie that can actually help you make better decisions about your technology purchases – whether you’re a CIO, program manager, IT manager or end user.
DLT has assembled a large selection of eBooks that set about to demystify technology concepts – from cloud computing to continuous monitoring, and more. We help you go beyond lofty concepts and get down to the nitty gritty of how your agency can find and make the best of its investments.
Why You Shouldn’t Just Rely on the Open Source Community to Harden Code
“Responsibility for secure open software is, well, complicated,” writes Government Computer News. It’s not just complicated; it’s also perhaps one of the most misunderstood aspects of open source software development.
You’ve no doubt read that open source software (OSS) is more secure than proprietary software because the code is genuinely hardened thanks to reviewers in the open source community who have tested it, tried to break it, and then fixed the problems they uncover.
Let’s Hear it for our “Magic Quadrant” Vendor Partners
Proof of performance is a key criterion for any government decision maker when reviewing potential vendors and bidders. One such “proof” is recognition from industry analysts, and perhaps the most sought after of these is to be positioned (and ranked highly) in Gartner’s Magic Quadrant reports.
No Network, No Services
Essential Network Monitoring Needs for Today’s Complex Federal IT Infrastructure
By Chris LaPoint, SolarWinds
It was all about the network
Become a “Data Ready Enterprise” at the 2015 Informatica Government Summit
If you’re situated within the Washington, D.C. metro area or surrounding states, mark your calendar for the 2015 Informatica Government Summit to be held on April 23, 2015 at the Grand Hyatt Washington Hotel.
Denial of Service Attacks Rise (“Internet of Things” Vulnerable)
With all the noise and hubbub around insider threats and data hacks, it’s easy to ignore that other threats persist. Most notably, denial-of-service (DDoS) attacks. DDoS occur when cyber criminals make a machine or network resource unavailable to its intended users.
Why the Speed of Your Storage Still Matters
With more and more software and services being offloaded to the cloud and the surge in big government data, the speed of your storage still matters – very much.
4 Ways Government Agencies Can Overcome Big Data Privacy Concerns
Driven by potentially compelling outcomes, big government data is growing. A 2013 study of federal IT officials by the TechAmerica Foundation, for example, found that big data delivers many benefits, including: