Business of Information Technology  >   Business Environment  >   Political Environment  >   Governments  >  

City Government

RSS Feed   
City Government Reports
 
The State and Local Cybersecurity Crisis
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Ransomware attacks are rising threat for government agencies. In 2019 alone, 22 cities experienced ransomware attacks – causing financial and reputational damage for agencies already facing budgetary constraints. Download this white paper to take a closer look at where the vulnerabilities lie & tactics that can help fill the resource gap.
Posted: 31 Jan 2020 | Published: 31 Jan 2020

Arctic Wolf Networks, Inc.

Moorabool Shire Council Case Study
sponsored by Mimecast
CASE STUDY: In this case study, discover how Moorabool Shire Council was able to immediately reduce the number of phishing and whaling attacks in order to reduce IT workload while maintaining security for the 250 email users within their municipality.
Posted: 10 Dec 2019 | Published: 10 Dec 2019

Mimecast

Mitigating Security Risks for State and Local Government
sponsored by Cyber-Ark Software
WEBCAST: Privileged access management (PAM) is a scalable approach to security that focuses on users rather than relying on a perimeter. The nature of PAM is especially beneficial for addressing the challenges that state & local government agencies face today. Watch this webinar to learn more about PAM and view a demo of CyberArk’s PAM offering.
Posted: 03 Apr 2020 | Premiered: Apr 3, 2020

Cyber-Ark Software

How Privileged Access Management Protects State and Local Agencies
sponsored by Cyber-Ark Software
PRODUCT OVERVIEW: Ensuring the security of personally identifiable information (PII) is a key responsibility for state and local government agencies. In this solution brief, explore the features and capabilities of the Privileged Access Management platform and discover how agencies are leveraging it to enhance their security posture and protect access to PII.
Posted: 02 Apr 2020 | Published: 02 Apr 2020

Cyber-Ark Software

Security in the Face of Disaster
sponsored by Motorola, Inc.
CASE STUDY: Read this white paper to learn how a New Orleans-based systems integrator relied on Motorola's Canopy® wireless broadband platform to bring better communications and security to New Orleans.
Posted: 08 Jun 2007 | Published: 01 Jan 2006

Motorola, Inc.

Computer Weekly – 31 July 2018: Learning digital government lessons from Estonia
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at one of the world's most digitally advanced nations, Estonia, and ask what the UK government can learn. We talk to Airbus about how aircraft manufacturers are prioritising cyber security. And we examine how AI and robots will augment – not replace – human productivity. Read the issue now.
Posted: 27 Jul 2018 | Published: 27 Jul 2018

ComputerWeekly.com

How SAP Customers Are Responding to the Planned 2025 End of ECC6 Mainstream Maintenance Deadline
sponsored by Rimini Street
WHITE PAPER: With the 2025 deadline on SAP’s ECC6 set in stone, the debate has arisen as to whether customers should continue to run on this platform or abort. Download these survey results, which includes 5 key takeaways and shares data on what other users plan to do with this deadline in place.
Posted: 08 Nov 2019 | Published: 08 Nov 2019


How to Measure IT Process Automation ROI
sponsored by Ayehu
WHITE PAPER: From compliance to deployment and provisioning to configuration management to performance management and to incident management: AI holds seemingly limitless applications. Download this automation ROI guide, which delivers 6 critical measurables to use when evaluating the true success of your AI implementation.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

Ayehu

Essential Guide: Internet of Things (IoT)
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this guide find out about the emerging market the Internet of Things (IoT). Find out advice, read case studies and learn how to manage the massive growth in connected devices and objects.
Posted: 20 Nov 2018 | Published: 20 Nov 2018

ComputerWeekly.com

Top 10 Middle East stories of 2018
sponsored by ComputerWeekly.com
EGUIDE: With money to invest and well-educated populations, the region is using advanced technology to enhance business as well as the quality of life. Read this top 10 for more examples of digital transformation in the Middle East.
Posted: 09 Jan 2019 | Published: 09 Jan 2019

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info