IT Management  >   Systems Operations  >   Security  >   Information Security  >  

Government Security

RSS Feed    Add to Google    Add to My Yahoo!
Government SecurityReports
 
NSA insiders reveal what went wrong
sponsored by ComputerWeekly.com
EBRIEF: Former NSA employees explain how the agency missed vital intelligence on 9/11, broke the US constitution through mass surveillance against US citizens, and wasted billions of dollars on technology.
Posted: 30 Jun 2014 | Published: 30 Jun 2014

ComputerWeekly.com

Agile Project Management for Government
sponsored by ComputerWeekly.com
BOOK: Brian Wernham shows how an agile  approach can incrementally deliver large mission and safety critical technology solutions.
Posted: 22 Mar 2013 | Published: 22 Mar 2013

ComputerWeekly.com

Put an End to Unplanned Outages
sponsored by Cox Communications, Inc.
WHITE PAPER: This white paper introduces one company's solutions to the critical issue of unplanned IT outages, ensuring maximum uptime and minimal losses in the event of a disruption.
Posted: 17 Jul 2014 | Published: 31 Dec 2013

Cox Communications, Inc.

Breaking Geographical Barriers in Government with Desktop Virtualization
sponsored by Dell
WHITE PAPER: This whitepaper explains how desktop virtualization can help organizations – specifically government institutions - move application processing from a physical desktop to the data center in order to fulfill the “anywhere, anytime” demands of mobile employees.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Dell

E-Discovery Case Law Update: What the Courts Expect of Your Search and Culling Efforts
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: This expert classroom supplies the latest case law update exploring recent court decisions related to e-discovery. Users will gain essential insights around the impact of these cases and where Web 2.0 comes into play, along with tactics and strategies organizations should consider to help control their e-discovery costs and risks.
Posted: 27 Aug 2013 | Premiered: 27 Aug 2013

SearchCompliance.com

WWW - World Wide Weaponization
sponsored by ESET
WEBCAST: The growth of the internet has brought about massively scalable distributed systems which have proved advantageous not only for governments, businesses and end-users, but also for criminals. In this webcast, review past, present, and future considerations regarding cybercrime, and discover next-generation methods of combating weaponized software.
Posted: 22 Oct 2009 | Premiered: Oct 22, 2009

ESET

Improved Scalability and Availability are the Keys to Better Storage Management
sponsored by EMC & Arrow
WHITE PAPER: This white paper highlights the benefits of scale-out NAS solution from EMC that can keep up with exponential data growth, increased regulations and compliance mandates. This solution provides the flexibility and availability that traditional storage approaches can't provide.
Posted: 22 Apr 2014 | Published: 28 Jun 2013

EMC & Arrow

Protecting Critical Data is a Main Priority for the U.S. Army
sponsored by GlobalScape
CASE STUDY: In this white paper, learn how the U.S. Army can protect their $68 billion-worth of annual data with a set of security solutions that easily integrate with their Standard Army Management Information System (STAMIS).
Posted: 22 May 2014 | Published: 31 Dec 2013

GlobalScape

Digital Trust in the Cloud: Liquid Security in Cloudy Places
sponsored by CSC
WHITE PAPER: While some individual users are experimenting with cloud processing, other users have already fully committed to the cloud as an important part of their enterprise architecture and operation. Read this white paper to learn about the evolution of cloud processing and whether or not the cloud processing boom will continue.
Posted: 17 Nov 2010 | Published: 17 Nov 2011

CSC

World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER: This guide explores the unique characteristics of cyber-attack campaigns waged by governments worldwide.
Posted: 05 Mar 2014 | Published: 31 Dec 2013

FireEye
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement