Defending Politically Vulnerable Organizations Online

July 23, 2018

This paper provides an overview of online threats to civil society organizations and individuals— including non-governmental organizations, journalists, and activists—that are targeted for political purposes, and it explores the ecosystem of resources available to help these organizations improve their cybersecurity. The report describes different methods commonly used to attack “politically vulnerable organizations,” and it identifies gaps in support resources that must be filled to ensure these organizations can securely carry out their missions online.

Spotlight

DLT Solutions

For more than 25 years, DLT Solutions has been dedicated to accelerating public sector growth for technology companies. Guided by our relentless focus on these challenges, we have grown to be one of the nation’s top providers of world-class IT solutions. Leveraging our strategic partnerships with premier IT companies, we develop best-fit solutions for our customers. Our sales, integration, and support experts have the certifications and experience in helping customers at any level of any agency.

OTHER WHITEPAPERS
news image

Cross-Generational Security Of Mobile Telephony

whitePaper | August 4, 2022

Abstract— With the recent roll-outs of 5G networks and the rise of phones supporting the standard, it’s critical to examine the technical underpinnings of 5G system security. The fifth generation of 3GPP (3rd Generation Partnership Project) mobile telephony, the lack of understanding, outright hostility, and general confusion surrounding this roll-out is unmatched in the history of mobility. We aim to alleviate much of the confusion and hostility by providing an overarching description and security document.

Read More
news image

What Is a Value Chain for Security

whitePaper | November 15, 2019

Cisco has architected and deploys a capability that continually assesses, monitors, and improves the security of our value chain throughout the entire lifecycle of our solutions.

Read More
news image

AWS Best Practices for DDoS Resiliency

whitePaper | December 5, 2019

You work to protect your business from the impact of Distributed Denial of Service (DDoS) attacks, as well as other cyberattacks. You want to keep your customers’ trust in your service by maintaining the availability and responsiveness of your application. And you want to avoid unnecessary direct costs when your infrastructure must scale in response to an attack.

Read More
news image

Cybersecurity 2018

whitePaper | February 2, 2020

Small businesses usually neglect cybersecurity as an essential function making their IT infrastructure vulnerable. IT security issues often cost companies a lot of money and downtime every year. Even if the IT infrastructure consists of couple laptops and Devices, cybersecurity should always be a top priority.

Read More
news image

AI Security White Paper

whitePaper | January 23, 2020

With the accumulation of big data, dramatic improvements in computing power, and continuous innovation in Machine Learning (ML) methods, Artificial Intelligence (AI) technologies such as image recognition, voice recognition, and natural language processing have become ubiquitous. Meanwhile, AI poses a significant impact on computer security: on the one hand, AI can be used to build defensive systems such as malware and network attack detection; on the other hand, AI might be exploited to launch more effective attacks.

Read More
news image

Avoiding the Security Pitfalls of Digital Transformation

whitePaper | April 1, 2020

Avoiding the Security Pitfalls of Digital Transformation is a webinar that will explore how organizations can cut through the noise and make a success of cloud transformation, leveraging the benefits of cloud technologies including efficiency, agility and scalability while avoiding the pitfalls.

Read More

Spotlight

DLT Solutions

For more than 25 years, DLT Solutions has been dedicated to accelerating public sector growth for technology companies. Guided by our relentless focus on these challenges, we have grown to be one of the nation’s top providers of world-class IT solutions. Leveraging our strategic partnerships with premier IT companies, we develop best-fit solutions for our customers. Our sales, integration, and support experts have the certifications and experience in helping customers at any level of any agency.

Events