This highly interesting resource delves into North Korea's cyber threat landscape, deeply analyzing what is known about the regime's capabilities and motives, which are largely shrouded in secrecy.
This article briefly describes the procurement challenges and then jumps into advising government cloud service purchasers on the positives and negatives of security in the cloud, and how to manage their potential vendors' security risks. Read on to learn more.
In this white paper, learn how the U.S. Army can protect their $68 billion-worth of annual data with a set of security solutions that easily integrate with their Standard Army Management Information System (STAMIS).
Learn how roadmap to effective eGovernment provides you with a pragmatic, manageable and cost-effective guide to identify which pieces of your information infrastructure can be strengthened to become a high-performance government agency.
This white paper will describe how companies have used internal RFID systems to reduce costs and improve efficiency, and explain how the lessons learned can be applied to a variety of industrial operations.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines