IT Agents  >   Government Agencies (U.S.)  >   Department of Commerce  >  

National Bureau of Standards

RSS Feed    Add to Google    Add to My Yahoo!
National Bureau of StandardsReports
 
The Need for Cloud Computing Security Standards
sponsored by SearchSecurity.com
EGUIDE: While cloud computing promises business advantages such as agility, efficiency, cost savings and more, many organizations are still hesitant to adopt for one prominent reason – security. In this expert e-guide uncover the driving need for cloud computing security standards and how this issue is being addressed.
Posted: 11 Apr 2012 | Published: 11 Apr 2012

SearchSecurity.com

Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives
sponsored by ISACA
WHITE PAPER: This paper clarifies what cloud computing is, identifies the services offered in the cloud, and also examines potential business benefits, risks, and assurance considerations. Read on to learn more about cloud computing from security, governance, and assuarance perspectives.
Posted: 10 Feb 2010 | Published: 01 Dec 2009

ISACA

DNSSEC - Secure DNS For Government
sponsored by BlueCat
WHITE PAPER: This document examines the standards and guidelines as outlined by NIST, and demonstrates the ways in which BlueCat Network’s DNS solution address these guidelines.
Posted: 01 Sep 2010 | Published: 31 Aug 2010

BlueCat

Setting standards in IT Industries
sponsored by DLT Solutions
EGUIDE: Building and adhering to security standards are essential for mitigating risk and ensuring adequate IT security. NIST is one of the first risk assessment standards, offering guidelines for securing the IT infrastructure. In this e-guide, gain an in-depth look into NIST and uncover how to decrease the risks that your industry faces.
Posted: 19 Mar 2012 | Published: 16 Mar 2012

DLT Solutions

The Modern Security Threat and Regulatory Compliance
sponsored by Bytware, Inc.
WEBCAST: SOX-style legislation and the evolving threat from viruses is challenging the ability of IT management to keep up with security requirements. This webcast explains why so many systems are at risk and what you can do to mitigate these threats.
Posted: 29 Sep 2008 | Premiered: Sep 29, 2008

Bytware, Inc.

High Performance, High Capacity 2048/4096-bit SSL Offload
sponsored by A10 Networks
WHITE PAPER: This informative white paper explains the need for secure socket layer (SSL) offloading in order to reduce added pressure on central processing units (CPUs) from 4096-bit keys.
Posted: 24 Sep 2013 | Published: 28 Feb 2013

A10 Networks

The Changing Role of the CIO
sponsored by Hewlett-Packard Limited
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 28 Nov 2012 | Published: 28 Nov 2012

Hewlett-Packard Limited

Get a Better Handle on Unspent Funds
sponsored by SAP America, Inc.
WHITE PAPER: This paper details SAP's range of public sector solutions, designed specifically to assist government agencies in proactively monitoring their current and future spending. Learn how to get a better handle on unspent funds such as unliquidated obligations (ULOs) by drilling into layers of data to create accurate reports and projections in real time.
Posted: 29 Jun 2012 | Published: 29 Jun 2012

SAP America, Inc.

Reduce Fraud, Waste and Abuse with Flexible Analytics
sponsored by SAP America, Inc.
WHITE PAPER: This paper examines how SAP's latest analytics solutions can analyze multiple databases in real-time to identify and prevent improper government payments before they happen. Read on to learn how government agencies can leverage this technology to speed up the process of accessing multiple data sources, reduce the burden on IT staff and much more.
Posted: 27 Jun 2012 | Published: 27 Jun 2012

SAP America, Inc.

World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER: This guide explores the unique characteristics of cyber-attack campaigns waged by governments worldwide.
Posted: 05 Mar 2014 | Published: 31 Dec 2013

FireEye
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement