August 24, 2016
5 Cybersecurity Threat Trends to be Aware of in 2016 premium
Last year, we reviewed threat reports from numerous companies and organizations.  At the time, a couple of simple themes emerged: too many systems were unpatched, and phishing was a predominant means of intrusion.  These themes are still present a year later, but some new trends have arisen to keep them company. Ransomware is on the […]
premium
Don Maclean
Chief Cybersecurity Technologist, DLT
August 22, 2016
4 Technology Stories You May Have Missed Last Week premium
NSA Use of Software Flaws for Hacking Posed Risk to Cybersecurity Recently, the Nation Security Agency’s (NSA) hacking tools were leaked to the public, exposing many vulnerabilities across the internet and putting companies at risk of data breaches. Many say that the NSA should have disclosed each vulnerability as soon as they discovered it so […]
premium
Tech Writer
August 18, 2016
3 Tactics Procurement Officers Can Use to Get Through the Craziness of Federal Year-End premium
With continued unpredictability about the annual federal appropriations process, the 2016 federal fiscal year-end busy season is likely to be as crazy as usual for federal procurement teams. According to testimony given before the Senate Committee on Homeland Security and Governmental Affairs in September 2015, Jason Fichtner a senior research fellow at George Mason University, […]
premium
Government Writer
August 15, 2016
4 Technology Stories You May Have Missed Last Week premium
DNC Creates Cybersecurity Advisory Board Following Hack Following the WikiLeak email dump right before the Democratic National Convention (DNC), the Democratic National Committee is creating a cybersecurity advisory board consisting of four industry experts. The board will be responsible for preventing future attacks on the DNC and making sure its cybersecurity capabilities are up-to-par. The […]
premium
Tech Writer
August 11, 2016
Symantec Government Symposium 2016: Let’s Fight Back with Actionable Intelligence premium
Last year, over 420 million malware variants were discovered, over half a billion personal information records were lost to breaches and one zero-day vulnerability was discovered each week. It’s time to fight back! The 13th annual Symantec Government Symposium converges in Washington, D.C. on August 30th for a discussion on this ever-evolving cyber landscape. Industry […]
premium
ali.glossner@dlt.com'
Cybersecurity Tech Writer
August 10, 2016
How to Achieve “Green” Infrastructure Goals with Analysis and Simulation premium
Just as our access to life-supporting resources is declining, our consumption of life supporting resources is on the rise. It’s a troubling dichotomy that is leading to increased policy making and regulation that puts pressure on federal, state, and local agencies to take action. The GSA, for example, requires that fossil fuel energy consumption be […]
premium
Autodesk Tech Writer
August 8, 2016
10 Reasons to Make the Switch from Land Desktop to Civil 3D premium
The much beloved Autodesk Land Desktop civil engineering solution was discontinued almost 10 years ago and replaced by Civil 3D, but that’s not to say it went away entirely. However, Land Desktop is no longer supported by Autodesk (i.e. no technical assistance if things go wrong, hot fixes, or service packs). Additionally, civil engineering software, […]
premium
Autodesk Tech Writer
August 4, 2016
Using Threat Hunting to Protect “Swiss Cheese” Security Infrastructures premium
As another high profile government leak hits the headlines in the wake of the Democratic National Convention (DNC), the focus on developing a more proactive security posture through threat hunting, not just remediation, has never been greater. “The DNC and the RNC have been Swiss cheese in terms of their security,” Wikileaks’ Julian Assange, told […]
premium
Government Writer
August 3, 2016
Close the Gap between Threat Detection and Response with User and Entity Behavior Analytics premium
Could user and entity behavior analytics (UEBA) be the missing piece of the puzzle that security teams have been waiting for in their bid to outmaneuver threat actors? As the average amount of time passed to identify data breaches caused by malicious attacks reaches staggering proportions (265 days) and the mean amount of time to […]
premium
Government Writer