IT Management  >   Systems Operations  >   Security  >   Information Security  >  

Government Security

RSS Feed    Add to Google    Add to My Yahoo!
Government Security Reports
 
Legal briefing: The Draft EU General Data Protection Regulation
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from law firm Morrison & Foerster, sets out some of the most important changes for private sector organisations in the draft EU Data Protection Regulation.
Posted: 28 Jan 2014 | Published: 28 Jan 2014

ComputerWeekly.com

Inside Job: A Better Strategy to Stop Insider Threats
sponsored by Infor
WHITE PAPER: Insider threats are the greatest risk to top-of-the-line cybersecurity. Your data and predictive analytics may be the best tools to protect against insider threats. This guide to insider threats walks you through a brief history of these threats, who could be considered insiders, and how to approach these issues now as well as in the future.
Posted: 24 Aug 2016 | Published: 31 Dec 2015

Infor

Situational Awareness Monitoring Helps US Government Agency Meet Cybersecurity Requirements
sponsored by Gigamon
WHITE PAPER: This white paper describes how the HHS was able to meet their rigid security requirements in an era of rising malicious cybersecurity threats. Discover how they were able to achieve pervasive visibility of all network traffic across geographically dispersed locations and keep their massive amount of private information safe.
Posted: 26 Sep 2016 | Published: 31 Dec 2015

Gigamon

Mobility In Government Services: A Regulatory Compliance Checklist
sponsored by BlackBerry
WHITE PAPER: Discover the struggles faced by the mobile solutions used by government organizations and not only why compliance is so challenging, but also why it's vitally important.
Posted: 12 Jul 2016 | Published: 12 Jul 2016

BlackBerry

NSA insiders reveal what went wrong
sponsored by ComputerWeekly.com
EBRIEF: Former NSA employees explain how the agency missed vital intelligence on 9/11, broke the US constitution through mass surveillance against US citizens, and wasted billions of dollars on technology.
Posted: 30 Jun 2014 | Published: 30 Jun 2014

ComputerWeekly.com

Achieving Federal Desktop Core Configuration Compliance with Lumension Solutions
sponsored by Lumension
WHITE PAPER: The Federal Desktop Core Configuration (FDCC) is an OMB mandated security configuration set applicable within United States Federal Government agencies. Learn how you can address each of the FDCC requirements with Lumension Vulnerability Management.
Posted: 18 Jun 2009 | Published: 28 May 2009

Lumension

Advanced Case Management for Government
sponsored by IBM
WHITE PAPER: How can you tap into today's data growth trend to improve processes? This white paper examines the drastic explosion of data and explores how governments have begun to handle this massive influx of information.
Posted: 02 Dec 2015 | Published: 02 Dec 2015

IBM

Computer Weekly – 11 August 2015: Data unlocks personalised customer service
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine how companies are starting to use big data analytics to deliver more personalised customer services. We talk to the government's IT procurement chief about improving public sector tech purchasing. And Volvo's CIO tells us how connected cars will reshape the automotive sector. Read the issue now.
Posted: 07 Aug 2015 | Published: 07 Aug 2015

ComputerWeekly.com

Clearswift Government Communications 2.0
sponsored by Clearswift
WHITE PAPER: In this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.
Posted: 08 Nov 2013 | Published: 31 Aug 2013

Clearswift

Improved Scalability and Availability are the Keys to Better Storage Management
sponsored by EMC & Arrow
WHITE PAPER: This white paper highlights the benefits of scale-out NAS solution from EMC that can keep up with exponential data growth, increased regulations and compliance mandates. This solution provides the flexibility and availability that traditional storage approaches can't provide.
Posted: 22 Apr 2014 | Published: 28 Jun 2013

EMC & Arrow
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement