Cybersecurity

August 24, 2016
5 Cybersecurity Threat Trends to be Aware of in 2016 premium
Last year, we reviewed threat reports from numerous companies and organizations.  At the time, a couple of simple themes emerged: too many systems were unpatched, and phishing was a predominant means of intrusion.  These themes are still present a year later, but some new trends have arisen to keep them company. Ransomware is on the […]
premium
Don Maclean
Chief Cybersecurity Technologist, DLT
August 11, 2016
Symantec Government Symposium 2016: Let’s Fight Back with Actionable Intelligence premium
Last year, over 420 million malware variants were discovered, over half a billion personal information records were lost to breaches and one zero-day vulnerability was discovered each week. It’s time to fight back! The 13th annual Symantec Government Symposium converges in Washington, D.C. on August 30th for a discussion on this ever-evolving cyber landscape. Industry […]
premium
ali.glossner@dlt.com'
Cybersecurity Tech Writer
August 4, 2016
Using Threat Hunting to Protect “Swiss Cheese” Security Infrastructures premium
As another high profile government leak hits the headlines in the wake of the Democratic National Convention (DNC), the focus on developing a more proactive security posture through threat hunting, not just remediation, has never been greater. “The DNC and the RNC have been Swiss cheese in terms of their security,” Wikileaks’ Julian Assange, told […]
premium
Government Writer
August 3, 2016
Close the Gap between Threat Detection and Response with User and Entity Behavior Analytics premium
Could user and entity behavior analytics (UEBA) be the missing piece of the puzzle that security teams have been waiting for in their bid to outmaneuver threat actors? As the average amount of time passed to identify data breaches caused by malicious attacks reaches staggering proportions (265 days) and the mean amount of time to […]
premium
Government Writer
July 22, 2016
6 Best Practices for Moving Beyond a Reactive, Point-Product Security Infrastructure premium
Incident response (IR) teams are overwhelmed. Larger attack surfaces, state-sponsored cyber terrorism, and the industrialization of cyber crime all create fires and headaches for IR teams. According to a survey by Intel Security, investigations are taking up too much time. Scoping an attack, finding out what systems were impacted, what was altered, and what other […]
premium
Government Writer
July 12, 2016
Where Does your Agency Stand on the Cyber Threat Hunting Maturity Model? premium
Many organizations are quickly discovering that cyber threat hunting is the next step in the evolution of the modern Security Operations Center (SOC). But what is “hunting”? Sqrrl, a leader in big data analytics and cybersecurity, defines hunting as “the process of proactively and iteratively searching through networks to detect and isolate advanced threats that […]
premium
ali.glossner@dlt.com'
Cybersecurity Tech Writer
July 1, 2016
No More F.U.D. (Fear, Uncertainty, Doubt) about Cyber Threats premium
I’m fed up. Better yet, I’m “F.U.D.-ed” up.  In every cybersecurity conference, in every threat report, in every blog and every bit of cybersecurity marketing literature I see one tiresome theme:  “The bad guys are after us!  It’s getting worse every day!  How will we fix it?  Can we fix it?  There’s no magic bullet! […]
premium
Don Maclean
Chief Cybersecurity Technologist, DLT
June 22, 2016
New: Your Guide to Government’s Critical Cyberthreats! premium
Data leaks, data breaches, blah, blah, blah. Sometimes the attention-grabbing headlines just sound like too much noise. What’s lacking in most of today’s reporting is the real truth about how government agencies are hacked and what agencies are doing to counter those attacks. Those are the details that can help agencies improve their defenses to […]
premium
Tech Writer
June 8, 2016
Could the Social Security Administration be the Next OPM? premium
According to a report by MeriTalk, the agency is demonstrating the same cyber-attack vulnerabilities as OPM did prior to its attack in 2014-2015 and it is getting the attention of Congress. In 2015, the Department of Homeland Security conducted a penetration test designed to explore cybersecurity gaps at SSA. The DHS report showed that testers […]
premium
Government Writer