eBook
Are you ready to reimagine learning for your agency? Download our new eBook to learn how to rethink, revamp, and improve.
Added:
Webinar
More than 50% of all attacks now target the application layer, yet fewer than 10% of agencies test all of their business critical applications. Application security is more important than ever, and will grow increasingly important as agencies search to find new solutions to this mounting problem. Join Don MacLean, Chief Cyber Security Technologist at DLT Solutions, and Chris Rhondeau, Principal Solution Architect at Veracode, as they discuss how to build and test Application Security programs for government agencies in this quick on-demand webinar.
Added:
Whitepaper
Recently launched, the DLT AnalyticsStack is a public sector focused Big Data, Analytics and Data Science 'solution stack' providing agencies with a scalable reference framework that addresses rapidly evolving big data requirements and use cases. Rather than just piecemealing products, the stack’s 'building-block' approach helps agencies quickly architect, procure and deploy enterprise analytics capabilities ranging from big data infrastructure to advanced analytics and data science capabilities. The DLT AnalyticsStack leverages the solution-oriented, ecosystem integration of the stack vendors to help agencies quickly realize the benefits of advanced analytics capabilities.
Added:
Data Sheet
Veracode’s cloud-based platform assesses applications for compliance with standard controls such as PCI, the OWASP Top 10 and the SANS Top 25. Policies can easily be customized to support specific corporate audit requirements as well as compliance requirements for SOX, HIPAA, NIST 800-53, MAS and other mandates.
Added:
Data Sheet
Veracode Web Application Scanning (WAS) offers a unified solution to discover, test and monitor all of your applications — not just the ones you know about. To manage the risk of applications in production, Veracode discovers and inventories your external web applications, then performs a lightweight, production-safe scan on thousands of sites in parallel to help you prioritize your biggest risks. For greater risk reduction, you can run authenticated deep scans on critical applications. In development, you can use Veracode WAS in staging or QA to detect vulnerabilities. In addition, Veracode offers multiple scanning technologies on a single platform, so you get unified results and analytics, plus increased accuracy.
Added:
Data Sheet
Veracode Greenlight finds security defects in your code and provides contextual remediation advice to help you fix issues in seconds, right in your IDE. Leveraging our proven, and highly accurate static engine, Veracode Greenlight offers immediate results and scales to your needs. You do not need to provision any servers or tune the engine. It simply scans in the background and provides accurate and actionable results, without taking up resources on your machine. With Veracode Greenlight, find issues early, reduce development and remediation costs, and release your code on time – at the speed of DevOps.
Added:
Data Sheet
Manage application security risk in a simple, strategic, scalable way. Find and fix software vulnerabilities in applications you build or buy.
Added:
Data Sheet
Learn how Veracode is securing today's application economy with their integrated suite of application securiy products and services.
Added:
eBook
As the amount of data increases each day, government agencies often have too much information to manage. From spreadsheets, relational databases, emails, images and much more, this data is filed away with the promise that it will be stored and managed in an organized, secure environment for later retrieval. Download the free e-book Veritas 360 Data Management for Govies to learn tips and tricks on data management.
Added:
eBook
DLT's cyber thought leadership partner, Institute for Critical Infrastructure Technology, recently released publication entitled “Next Generation Defenses for a Hyper Evolving Threat Landscape: An Anthology of ICIT Fellow Essays Volume I,” is a compilation of essays written by ICIT Fellows and Contributors including DLT Chief Cyber Technologist, Don Maclean, which offer a wide-ranging look at some of the most impactful cybersecurity defenses that should be leveraged by public and private sector organizations.
Added:
Webinar
Join a host of familiar Autodesk faces as they walkthrough the phases of a challenging roadway project in a 4 part series. From gathering data about the existing situation, producing a project concept, moving that concept to the detailed design phase, conducting additional analysis, and finally creating compelling visualizations to share with project stakeholders, including low cost virtual reality.
Added:
Webinar
On-demand webinar featuring Jamie Jones, Federal Solutions Engineer, GitHub and David Larrimore, CTO U.S. DHS, Immigration and Customs Enforcement to learn how you can securely build and share code that is compliant with the Federal Source Code Policy. GitHub lets developers at agencies collaborate to ship better code, securely on your own servers or AWS GovCloud and Azure Government.
Added:
Webinar
Experts from DLT, AWS and Evident.io exchanged perspectives on what NIST 800-53 compliance means for government agencies and private organizations alike.
Added:
Webinar
Join DLT for a discussion of going to the cloud and what you can do to assess the readiness of your own technology, staff and clients for the move.
Added:
Case Study
Department of Defense ensures success of its first Bug Bounty Program by calling upon Akamai for site uptime and protection.
Added: