The Environmental Protection Agency and its Zero Trust Journey

This article originally appeared on DLT Solutions’ official blog, “Technically Speaking.”  In a recent webinar produced by Federal News Network, the Director of the Environmental Protection Agency (EPA)’s Office of Information Security and Privacy, Tonya Manning, detailed the state of…

Federal government looks to bolster cybersecurity infrastructures due to heightened security threats

This article originally appeared on the official DLT Solutions blog. The heightened threat of retaliatory cyberattacks by Russia against critical U.S. IT infrastructure is prompting federal investments in cybersecurity to strengthen its cyber defense posture. The ongoing conflict in the…

How the U.S. Government Can Stop Cyber Threats Emerging from the Ukraine-Russia Conflict

This article originally appeared on the official DLT Solutions blog. Though the Ukraine-Russia conflict began when the Russian military invaded Ukraine last February, the cybersecurity and cyber warfare elements of this conflict began long before initial combat action. Ukraine was…

How the U.S. Department of the Navy is Approaching Zero Trust

This article originally appeared on the DLT Solutions official blog and can be found here. The U.S. Navy and Marine Corps are grappling with the multi-headed hydra that is cybersecurity. At the Department of Navy (DON) IT Conference 2022, the…

How a Zero Trust Methodology is Helping to Redefine Government IT According to DLT’s Don Maclean

Government IT teams are worried and for good reason. Confronted by the rising threat of sophisticated cyberattacks, they are looking at an uncertain future and wondering if they have the best tools to defend their systems. When defenders create new…

Federal Zero Trust: Agencies have questions, Quest and DLT have answers

In the last few years, there has been a dramatic increase in both the number and sophistication levels of cyberattacks against federal agencies. And with a record number of federal employees relying on remote work technologies, agency network perimeters are…

Nation-state attack on government validates concerns about AppSec and supply chain security

One of the top trends that we witnessed covering government and military cybersecurity in 2020 – aside from the massive upswing in threats that accompanied the ongoing COVID-19 pandemic – was a renewed and increased focus on securing the supply…

“Some Things Haven’t Changed” – Chris Wilkinson discusses the difficult task of defending government networks

Just last month, the Prime Minister of Australia, Scott Morrison, announced that his country was facing a massive cyberattack that was impacting, “Australian organizations across a range of sectors, including all levels of government, industry, political organizations, education, health, essential…

The CMMC and continuous monitoring – is it a good idea?

In April of this year, the CMMC advisory board issued an interesting RFP that caught a few off guard and raised a lot of questions among the defense industrial base (DIB). That RFP involved the creation of a continuous monitoring…