• thumb1

    Changing AWS’ Elastic Load Balance Connection Timeout

    Yesterday, Amazon Web Services (AWS) announced the ability to customize the idle timeout for their E...

  • thumb2

    The 4 Steps To Opening Your Agency’s Data

    Open government is not about releasing every bit and byte you’ve ever collected to the world. Withou...

  • thumb3

    The State of Phishing Cyber Attacks: An Infographic

    Though it's the oldest hacking trick in the book, phishing cyber attacks are still a nightmare for c...

  • thumb4

    Where Contract Administration Meets the Cloud

    Chris Rader is a DLT Solutions Senior Contract Administrator, a cloud enthusiast, a cloud procuremen...

  • thumb5

    Government Social Media Use – A Few Tips for Employees About Social Media Security

    Social media outlets like Twitter, Facebook, Tumblr, and LinkedIn are great because they allow us to...

Latest Headlines

The 4 Steps To Opening Your Agency’s Data

Data Collection

Open government is not about releasing every bit and byte you’ve ever collected to the world. Without context and structure, that data will not be applied in ways that will most benefit you and your constituents. We have identified four steps to help your agency move along the data flow process. Read More »

The State of Phishing Cyber Attacks: An Infographic

Phishing Infographic

Though it's the oldest hacking trick in the book, phishing cyber attacks are still a nightmare for cybersecurity. We created an infographic that offers a look at what phishing attacks are, how they're launched, tips to defend yourself, and examples. Read More »

Recent Posts