Cybersecurity

August 24, 2016
5 Cybersecurity Threat Trends to be Aware of in 2016 premium
Last year, we reviewed threat reports from numerous companies and organizations.  At the time, a couple of simple themes emerged: too many systems were unpatched, and phishing was a predominant means of intrusion.  These themes are still present a year later, but some new trends have arisen to keep them company. Ransomware is on the […]
premium
Don Maclean
Chief Cybersecurity Technologist, DLT
August 4, 2016
Using Threat Hunting to Protect “Swiss Cheese” Security Infrastructures premium
As another high profile government leak hits the headlines in the wake of the Democratic National Convention (DNC), the focus on developing a more proactive security posture through threat hunting, not just remediation, has never been greater. “The DNC and the RNC have been Swiss cheese in terms of their security,” Wikileaks’ Julian Assange, told […]
premium
Government Writer
August 3, 2016
Close the Gap between Threat Detection and Response with User and Entity Behavior Analytics premium
Could user and entity behavior analytics (UEBA) be the missing piece of the puzzle that security teams have been waiting for in their bid to outmaneuver threat actors? As the average amount of time passed to identify data breaches caused by malicious attacks reaches staggering proportions (265 days) and the mean amount of time to […]
premium
Government Writer
August 1, 2016
4 Technology Stories You May Have Missed Last Week premium
The Most Critical Skills Gap: Cybersecurity Since Target’s hack back in 2013, cybersecurity has been top of mind for organizations, especially those with sensitive information. However, the talent pool of those who are skilled in intrusion detection, secure software development and attack mitigation is not growing at the same rate as the demand. Many reasons […]
premium
Tech Writer
July 25, 2016
4 Technology Stories You May Have Missed Last Week premium
Technology Is Monitoring the Urban Landscape Technology is changing the urban landscape in the U.S., starting with San Francisco, by automating and remodeling buildings and streets. Parking spaces will be cut down, thanks to Uber, Lyft and self-driving cars making car-sharing easier, and buildings will be remodeled using 3D printing and robots to help with […]
premium
Tech Writer
July 22, 2016
6 Best Practices for Moving Beyond a Reactive, Point-Product Security Infrastructure premium
Incident response (IR) teams are overwhelmed. Larger attack surfaces, state-sponsored cyber terrorism, and the industrialization of cyber crime all create fires and headaches for IR teams. According to a survey by Intel Security, investigations are taking up too much time. Scoping an attack, finding out what systems were impacted, what was altered, and what other […]
premium
Government Writer
July 12, 2016
Where Does your Agency Stand on the Cyber Threat Hunting Maturity Model? premium
Many organizations are quickly discovering that cyber threat hunting is the next step in the evolution of the modern Security Operations Center (SOC). But what is “hunting”? Sqrrl, a leader in big data analytics and cybersecurity, defines hunting as “the process of proactively and iteratively searching through networks to detect and isolate advanced threats that […]
premium
ali.glossner@dlt.com'
Cybersecurity Tech Writer
July 4, 2016
Technically News: Happy 4th of July! premium
This All-Star Team Plans to Jumpstart 100 Cybersecurity Companies in 3 Years A team of entrepreneurs out of Boston, including DLT board member Chris Lynch, created a group named Hack / Secure, whose overall goal is to jumpstart 100 cybersecurity companies in three years. Hack / Secure is made up of 25 top cyber entrepreneurs, […]
premium
Tech Writer
July 1, 2016
No More F.U.D. (Fear, Uncertainty, Doubt) about Cyber Threats premium
I’m fed up. Better yet, I’m “F.U.D.-ed” up.  In every cybersecurity conference, in every threat report, in every blog and every bit of cybersecurity marketing literature I see one tiresome theme:  “The bad guys are after us!  It’s getting worse every day!  How will we fix it?  Can we fix it?  There’s no magic bullet! […]
premium
Don Maclean
Chief Cybersecurity Technologist, DLT