How a Zero Trust Methodology is Helping to Redefine Government IT According to DLT’s Don Maclean

Government IT teams are worried and for good reason. Confronted by the rising threat of sophisticated cyberattacks, they are looking at an uncertain future and wondering if they have the best tools to defend their systems. When defenders create new…

Federal Zero Trust: Agencies have questions, Quest and DLT have answers

In the last few years, there has been a dramatic increase in both the number and sophistication levels of cyberattacks against federal agencies. And with a record number of federal employees relying on remote work technologies, agency network perimeters are…

The CMMC and continuous monitoring – is it a good idea?

In April of this year, the CMMC advisory board issued an interesting RFP that caught a few off guard and raised a lot of questions among the defense industrial base (DIB). That RFP involved the creation of a continuous monitoring…

Why security takes a backseat in IoT devices

The “Internet of Things,” or IOT: we’ve all heard the term, but what does it really mean? More importantly, how do we secure all of these … “things”? First, a stab at defining the term and its components. The term…