IT Management  >   Systems Operations  >   Security  >   Information Security  >  

Government Information Security

RSS Feed   
ALSO CALLED: Government Security
DEFINITION: Ensuring the confidentiality of sensitive information processed by, stored in, and moved through information systems and applications belonging to the government and government agencies.
Government Information Security Reports
1 - 25 of 51 Matches Previous Page  |  Next Page
UK police unlawfully processing over a million people's data on Microsoft 365
sponsored by ComputerWeekly.com
EGUIDE: The roll-out of Microsoft 365 to dozens of UK police forces may be unlawful, because many have failed to conduct data protection checks before deployment and hold no information on their contracts.
Posted: 01 Jul 2021 | Published: 01 Jul 2021

ComputerWeekly.com

Sumo Logic & AWS: Real-time Operations and Security Insights for Government IT
sponsored by AWS
PRODUCT OVERVIEW: As government IT systems grow increasingly complex, teams need to efficiently find and resolve issues spanning on-prem, hybrid-cloud, and cloud-native workloads. Access this solution brief to discover how Sumo Logic can address these challenges by offering visibility and insights across the entire lifecycle of government applications.
Posted: 09 Jun 2021 | Published: 09 Jun 2021

AWS

Thales Solutions for White House Executive Order on Improving the Nation’s Cybersecurity
sponsored by Thales
WHITE PAPER: The White House just issued an Executive Order on improving the Nation’s Cybersecurity. Luckily, Thales offers robust authentication and data encryption that addresses the requirements outlined in the Executive Order. Access this resource to learn about the Executive Order and Thales data protection.
Posted: 02 Jun 2021 | Published: 02 Jun 2021

Thales

Best Practices for Implementing the White House Executive Order on Improving the Nation’s Cybersecurity Infrastructure
sponsored by Thales
WHITE PAPER: Access this white paper to learn about the key requirements outlined in the White House Executive Order on Improving the Nation's Cybersecurity Infrastructure and how Thales can ensure the successful and timely implementation of Zero Trust, encryption, and authentication security solutions.
Posted: 02 Jun 2021 | Published: 02 Jun 2021

Thales

Rethinking Cyber Risk in a Re-globalized World with Andrea Little Limbago, VP Research and Analysis
sponsored by Interos
WEBCAST: The global pandemic has created seismic shifts in technology trends, particularly as they pertain to the global economy. Organizations are being driven to rethink their policies on security and risk.
Posted: 23 Feb 2021 | Premiered: Nov 5, 2020

Interos

Has COVID-19 made local government less cyber secure?
sponsored by Zivver
RESOURCE: The rapid adoption of remote work capabilities has enabled organizations, who would have otherwise needed to pause operations, to remain operational – an especially important feat for local government agencies
Posted: 10 Feb 2021 | Published: 10 Feb 2021

Zivver

UK police unlawfully processing over a million people's data on Microsoft 365
sponsored by ComputerWeekly.com
EGUIDE: The roll-out of Microsoft 365 to dozens of UK police forces may be unlawful, because many have failed to conduct data protection checks before deployment and hold no information on their contracts.
Posted: 21 Dec 2020 | Published: 21 Dec 2020

ComputerWeekly.com

NIST SP 800-171 and CUI
sponsored by HelpSystems
PRODUCT OVERVIEW: Both the CUI and NIST SP 800-171 programs are designed to standardize how government agencies (federal or nonfederal) manage and protect unclassified information – but ensuring compliance can be tricky. Read this solution brief to see how Titus is helping contractors comply with each of these requirements.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

HelpSystems

Seamless transition to CUI markings
sponsored by HelpSystems
PRODUCT OVERVIEW: The Controlled Unclassified Information (CUI) program was implemented to standardize how government agencies safeguard unclassified information – however the program can be complex and time-consuming. Read this solution brief to learn about how Titus is helping agencies reduce the time and stress of a CUI program.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

HelpSystems

Salesforce Customer 360
sponsored by Salesforce
PRODUCT OVERVIEW: Government missions are complex, but the business processes and systems driving them don’t have to be. Learn how you can integrate your teams and technologies around one CRM platform—enabling all employees to engage customers like a unified organization, not a series of different, disconnected departments—with Salesforce.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Salesforce

2020 Election Security
sponsored by WhiteHat Security
WHITE PAPER: Around the globe, we’ve witnessed how cybercriminals can create chaos during election cycles by disqualifying legitimate voters, corrupting voter data and launching denial-of-service attacks. In recent years, U.S. elections have come under continuous assault. See this white paper to learn about the security challenges this causes for the country.
Posted: 17 Nov 2020 | Published: 17 Nov 2020

WhiteHat Security

Security Without Compromise
sponsored by Remediant
CASE STUDY: As a result of a mandate, a major U.S. government contractor was in search of a highly-scalable solution that could couple multi-factor authentication and dynamic privileged access – and it had to be efficient and compliant. As it turned out, they were able to get what they needed and more. Take a look at this case study to learn the specifics.
Posted: 17 Aug 2020 | Published: 17 Aug 2020

Remediant

Implementing the NIST Cybersecurity Framework in Government
sponsored by Absolute Software Corporation
WHITE PAPER: The NIST Cybersecurity Framework outlines 5 functions that, when implemented properly, help organizations drive efficiency while ensuring data security. In this whitepaper focuses on how the NIST Cybersecurity Framework can – and should – be implemented to address the rising cybersecurity challenges in the public sector.
Posted: 30 Jul 2020 | Published: 30 Jul 2020

Absolute Software Corporation

Securing Your Cloud Solutions for Government Adoption
sponsored by Coalfire
ANALYST REPORT: FedRAMP establishes cybersecurity requirements for CSPs that deliver solutions to the federal market and utilizes independent experts to advise organizations and assess their compliance. In this report, assess the market and industry dynamics that affect both FedRAMP and cloud adoption in the federal government.
Posted: 13 Jul 2020 | Published: 13 Jul 2020

Coalfire

Connecting Technologies that Protect First Responders and Communities
sponsored by Cradlepoint
VIDEO: In this video, learn how Cradlepoint can help provide the secure connectivity that first responders including police, fire, and EMS agencies need to leverage critical technologies and access up-to-date information 24x7.
Posted: 20 May 2020 | Premiered: 04 May 2020

Cradlepoint

How Government Agencies Can Enhance Security and Reduce Costs
sponsored by ServiceNow
WHITE PAPER: IT security teams in the public sector are challenged with providing security and innovation while driving down costs. Download this report to take a closer look at the challenges plaguing government agencies and discover a platform that can help to facilitate innovation without exhausting resources.
Posted: 06 Feb 2020 | Published: 31 Jan 2018

ServiceNow

Government Agency Embraces Domain Intelligence to Pre-emptively Block Threats
sponsored by DomainTools
CASE STUDY: In this case study, discover how a major metropolitan government agency was able to incorporate a platform that enabled them to anticipate & block threats before they breach the perimeter and utilize their existing data to improve their collective intelligence to optimize IT resources. Download the report to take a closer look.
Posted: 31 Jan 2020 | Published: 31 Jan 2020

DomainTools

Computer Weekly – 7 May 2019: Nurturing innovation at DWP
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how the Department for Work and Pensions (DWP) is managing digital innovation. We look at Anthos, Google's new multicloud platform. And we report from the NCSC cyber security conference where experts discussed the lessons learned from recent high-profile attacks. Read the issue now.
Posted: 03 May 2019 | Published: 03 May 2019

ComputerWeekly.com

Computer Weekly – 23 October 2018: Where next for digital identity?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the government hands its digital identity service, Gov.uk Verify, to the private sector, we examine the history and prospects for the troubled system. Our latest buyer's guide looks at cloud-native architecture. And we compare the flash storage capabilities of the leading cloud providers. Read the issue now.
Posted: 19 Oct 2018 | Published: 19 Oct 2018

ComputerWeekly.com

Computer Weekly – 13 March 2018: Unlocking digital change in criminal justice
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the IT and digital chief at the Ministry of Justice about digital transformation across the criminal justice system. European cities are trying to attract British IT talent as a result of Brexit – what does it mean for UK IT? And we take an in-depth look at the fintech sector. Read the issue now.
Posted: 09 Mar 2018 | Published: 09 Mar 2018

ComputerWeekly.com

Spotlight on ANZ: Government IT
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, you can read more about the challenges that Australia's government is facing in bringing the country's national fibre network up to speed, its plans to push ahead with decryption laws and what it is doing to safeguard critical infrastructure from cyber-attacks.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

ComputerWeekly.com

The Investigatory Powers Act 2016 and Internet Connections Records
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
Posted: 09 May 2017 | Published: 09 May 2017

ComputerWeekly.com

Computer Weekly - 13 July 2021: Driving intelligence - behind the scenes of Volkswagen's in-car software
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we go behind the scenes of Volkswagen's in-car software R&D centre. The UK's largest supercomputer has gone live in Cambridge – we find out how it will transform healthcare research. And we talk to DWP's digital chief about the restructuring of its IT capabilities. Read the issue now.
Posted: 12 Jul 2021 | Published: 13 Jul 2021

ComputerWeekly.com

IT Security Challenges for State and Local Government IT Departments
sponsored by Dell Technologies
RESOURCE: Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.
Posted: 12 May 2020 | Published: 12 May 2020

Dell Technologies

State and Local Governments Chart Their Path Toward Improved Digital Security
sponsored by Dell Technologies
RESOURCE: State and local governments are under attack from cyberespionage and malware, and they are exposed to a broad variety of security risks. New approaches are needed to make government IT less vulnerable. In this infographic, learn 7 best practices for cybersecurity in state and local governments.
Posted: 12 May 2020 | Published: 12 May 2020

Dell Technologies
1 - 25 of 51 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences