Authentication is the new entry point into federal government networks. Most federal users know this, and more importantly, attackers know this as well. Federal agencies can no longer recommend changing passwords on a periodic basis and consider that an adequate…
How CISA can assist federal agencies in navigating the “Wild, Wild, West” of cyber defense
Over the past decade, cybercrime has proven to be one of the greatest threats facing the American public. One can look to the unprecedented Colonial Pipeline attack as a prime example. This cyberattack led to millions of Americans being denied…
5 ways federal government agencies can reduce risk from attack vectors
A data breach can be a catastrophic event for any federal government agency. One way to help curb potential exploits is to get a handle on potential attack vectors. An attack vector is the combination of a bad actor’s intentions…
Ransomware Resilience and Disaster Recovery – 4 Actions Government Agencies Can Execute Today
Ransomware has been a prominent threat to government agencies, enterprises, and individuals alike since the mid-2000s. In 2017, the FBI’s Internet Crime Complaint Center (IC3) received 1,783 ransomware complaints that cost victims over $2.3 million. Those complaints, however, represent only the…
How the U.S. Government Can Stop Cyber Threats Emerging from the Ukraine-Russia Conflict
This article originally appeared on the official DLT Solutions blog. Though the Ukraine-Russia conflict began when the Russian military invaded Ukraine last February, the cybersecurity and cyber warfare elements of this conflict began long before initial combat action. Ukraine was…
Six Strategies to Minimize Your Agency’s IT Attack Surface
Recent events around the world have demonstrated that there are countless attack vectors which cybercriminals can exploit to gain access to your network, and your data. With cyberattacks costing their victims millions of dollars, being able to prevent these malicious…
Three DDoS Lessons Learned from the 2H 2021 Threat Intel Report
NETSCOUT recently released the latest installment of its Threat Intelligence Report, which features the insights and information extrapolated from the data generated by NETSCOUT ASERT in their work defending the networks of government agencies and large enterprises from DDoS atatcks.…
How a Zero Trust Methodology is Helping to Redefine Government IT According to DLT’s Don Maclean
Government IT teams are worried and for good reason. Confronted by the rising threat of sophisticated cyberattacks, they are looking at an uncertain future and wondering if they have the best tools to defend their systems. When defenders create new…
3 Ways That a Whole-of-Nation IT Approach Can Challenge Ransomware Attackers in 2022
Recently the Institute for Critical Infrastructure Technology (ICIT), known for being, “the cybersecurity think tank,” released a paper titled, “Ransomware Weaponized.” Diving into the nature of modern ransomware, the organization wrote extensively on the need for a wider and more…
Cloud Navigator – Charting a Course to More Secure IT Solutions
This article was originally published on GovDevSecOpsHub, that article can be found here. Today it is quite uncontroversial to say that the cloud is here and that it is not going anywhere anytime soon. Two years ago, this was a…