IT Management  >   Systems Operations  >   Security  >   Information Security  >  

Government Security

RSS Feed    Add to Google    Add to My Yahoo!
Government Security Reports
 
Search Security University: Cyber Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Join this SearchSecurity.com University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.
Posted: 14 Aug 2013 | Premiered: 15 Aug 2013

SearchSecurity.com

Legal briefing: The Draft EU General Data Protection Regulation
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from law firm Morrison & Foerster, sets out some of the most important changes for private sector organisations in the draft EU Data Protection Regulation.
Posted: 28 Jan 2014 | Published: 28 Jan 2014

ComputerWeekly.com

Flash Storage The Critical Piece in the Performance Puzzle
sponsored by Pure Storage
WEBCAST: Access this webcast to learn about how flash storage can be successfully utilized within government organizations.
Posted: 25 Jun 2015 | Premiered: Jun 12, 2014

Pure Storage

California Sets New Standard For IT With Shared Services
sponsored by NetApp
CASE STUDY: This case study explores how a large state agency implemented a cloud infrastructure to help unite 29 IT departments, lower costs, and increase data storage capacity.
Posted: 09 Jul 2015 | Published: 31 Dec 2014

NetApp

AGESIC (Uraguay)
sponsored by IBM
CASE STUDY: Working with IBM and IBM® Business Partner Urudata Software, AGESIC has implemented a multitier architecture that provides a comprehensive security solution for e-government services and addresses transport security, access control and identity management.
Posted: 01 Jul 2011 | Published: 30 Jun 2011

IBM

Guard Data In Government Environments by Implementing Continuous Diagnostics and Mitigation
sponsored by IBM
WHITE PAPER: This resource features a cost-effective automated diagnostics and mitigation security solution that offers continuous protection and is easily integrated with existing systems.
Posted: 09 May 2014 | Published: 31 Dec 2013

IBM

Whitepaper: Roadmap to Effective eGovernment
sponsored by EMC Corporation
WHITE PAPER: This detailed handbook covers four stages – from paper-based dependency to the achievement of connected government. A best-practices roadmap will offer you the ideal strategy for your current information infrastructure.
Posted: 20 Nov 2009 | Published: 20 Nov 2009

EMC Corporation

World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER: This guide explores the unique characteristics of cyber-attack campaigns waged by governments worldwide.
Posted: 05 Mar 2014 | Published: 31 Dec 2013

FireEye

Achieving Federal Desktop Core Configuration Compliance with Lumension Solutions
sponsored by Lumension
WHITE PAPER: The Federal Desktop Core Configuration (FDCC) is an OMB mandated security configuration set applicable within United States Federal Government agencies. Learn how you can address each of the FDCC requirements with Lumension Vulnerability Management.
Posted: 18 Jun 2009 | Published: 28 May 2009

Lumension

Presentation Transcript: WWW - World Wide Weaponization
sponsored by ESET
PRESENTATION TRANSCRIPT: The growth of the internet brought about massively scalable distributed systems which have proved advantageous not only for governments, businesses and end-users, but also for criminals. In this webcast, review past, present, and future considerations regarding cybercrime, and discover next-generation methods of combating weaponized software.
Posted: 10 Nov 2009 | Published: 10 Nov 2009

ESET
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement