Subscribe

Business Applications
If your agency has already implemented some form of application security, you’re already ahead of the curve. But your program may still have room for improvement. To help you take your application security (AppSec) program to the next level, we’ve put together this list of best practices from DLT partner, Veracode. 1. Shift Left
IT Perspective, Uncategorized
The latest data on the progress of federal government agencies’ implementation of the Federal Information Technology Acquisition Reform Act (FITARA) was released on June 26 by the House Oversight and Reform Committee as Scorecard 8.0.
IT Perspective
DLT Solutions recently sat down with Red Hat Chief Technologist, North America Public Sector, David Egts, to discuss the recent release of Red Hat OpenShift.   DLT: So David, tell us a little about what you do at Red Hat.
Cloud Computing, Uncategorized
Key takeaways show how public sector customers are achieving more with cloud. As cloud continues to transform the public sector, cloud has had its own metamorphosis: from a trendy buzz word to a catalyst for meaningful change, innovation, and more. Last month, AWS hosted its 10th annual AWS Public Sector Summit. The conference brought together more than 17,000 attendees for 2+ days of insights, sessions, and networking, and explored how cloud is fueling the public sector for a limitless future. Recap
Cybersecurity
Although state and local technology leaders are increasingly prioritizing cybersecurity in their operations, government has a long way to go in securing critical information and systems from cyberattacks. In light of this struggle, Route Fifty, in partnership with CrowdStrike, recently hosted a webcast that showcases the work of state and local governments who have undergone a transformation in cybersecurity protocols – and the challenges they continue to face.
Infrastructure, IT Perspective
A vast majority of government networks are driven by Microsoft products, from Office 365 to the Azure cloud platform. It should come as no surprise, then, that more and more agencies are looking for tools to monitor Microsoft systems more effectively—all through a single pane of glass. The good news is there are ways to make the most of existing Microsoft technology with complementary monitoring strategies that will meet the needs of the federal IT operations security teams, SysAdmins, DevOps pros, and managers.