September 1, 2015
Symantec Now Protecting More Than One Billion IoT Devices premium
The Internet of Things (IoT) just got a lot more secure. DLT partner, Symantec, announced in late August that it is securing more than one billion IoT devices – including everything from ATMs to vehicles to critical infrastructure. The number of IoT devices is expected to reach 25 billion by 2020, and from a security […]
premium
Government Writer
August 31, 2015
Get Ready to Welcome Fiscal Year 2016 with some Cybersecurity Smarts premium
After what’s been a devastating year for federal cybersecurity, you might want to consider kicking off the new fiscal year with some cybersecurity smarts. That’s exactly the goal of Nextgov Prime: Data, Cybersecurity and the Government of Tomorrow taking place in Washington, D.C. on September 9th. From defending agencies against attackers who seem to be […]
premium
Government Writer
August 25, 2015
Simplifying Application Delivery with Containers premium
In my last post, I mentioned that a good use case for containers is managing application deployments.  I’m going to go a step further here and state that containers are the next evolution of application packaging and application run time separation. Packaging in the time of Docker In the beginning, an application was created from […]
premium
Solutions Architect, DLT
August 20, 2015
Is Fiscal Year-End Really a “Use It or Lose It” Crunch Time for Federal Buyers? premium
Federal fiscal year-end is right around the corner, but is it really the busy buying season that we’ve come to expect? As any Fed or politico knows, September is traditionally the month that keeps purchasing officers on their toes and budget hawks in attack mode. As budgets expire, agencies are often perceived as rushing to […]
premium
Government Writer
August 18, 2015
Survey Shows IT Shared Services Offer Significant Benefits – and Some Challenges premium
As kids we learned a simple yet powerful lesson that taught us a lifelong truth: sharing resources leads to positive outcomes. Today, federal IT managers are learning that lesson all over again. Except now, the toys being shared are managers and resources devoted to websites, content, performance, and infrastructure management, among other things. The White […]
premium
Chief Information Officer, SolarWinds
August 17, 2015
Spam Gets Canned: Rates Drop Below 50% for First Time in a Decade premium
According to the latest monthly intelligence threat report from DLT partner, Symantec, spam has dropped below 50% for the first time since September 2003. During June 2015, of the 25 billion email messages monitored by Symantec only 46.4% were junk. So what’s behind the downward trend? Symantec points to a number of factors including action […]
premium
Government Writer
August 12, 2015
5 Reasons Why Conventional IT Security is Failing and CDM is your Best Defense premium
Security breaches are on the rise and government systems are goldmines for would-be intruders. If 2015 has taught us anything it’s that it’s no longer a case of if or when a significant security incident will occur, but how well your processes and controls address detection, analysis and response. Aside from intent, why are intruders […]
premium
Government Writer
August 10, 2015
Finding the Positives in the Wake of the Data Breach at OPM premium
We all know the negative outcomes of the data breach at the Office of Personnel Management (OPM) and can only hope that there are no more surprises stemming from the hack. Yet, despite the gloom and doom, the attack has delivered some positives and has quickly become a major catalyst for change in how the […]
premium
Government Writer
August 6, 2015
Top 10 Ways to Protect Government IT against Sophisticated Cyber Attacks premium
IT security threats are getting increasingly sophisticated – zero-day threats, propagating worms, and low-and-slow attacks – each of which defy most detection mechanisms and keep CISOs increasingly on their toes. Mitigating and preventing these attacks has traditionally been approached through layered security practices, but with the help of industry developments agencies have another option for pinpointing malicious […]
premium
Government Writer