IT Management  >   Systems Operations  >   Security  >   Information Security  >  

Government Information Security

RSS Feed   
ALSO CALLED: Government Security
DEFINITION: Ensuring the confidentiality of sensitive information processed by, stored in, and moved through information systems and applications belonging to the government and government agencies.
Government Information Security Reports
1 - 25 of 54 Matches Previous Page  |  Next Page
Protecting Government Assets
sponsored by Dell
RESOURCE: Take a look at this infographic to find out how thin clients can provide government organizations at the local, regional, and federal levels with a secure platform that enables IT to meet strict government mandates to access highly sensitive information.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

Dell

Computer Weekly – 23 October 2018: Where next for digital identity?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the government hands its digital identity service, Gov.uk Verify, to the private sector, we examine the history and prospects for the troubled system. Our latest buyer's guide looks at cloud-native architecture. And we compare the flash storage capabilities of the leading cloud providers. Read the issue now.
Posted: 19 Oct 2018 | Published: 19 Oct 2018

ComputerWeekly.com

InSecurity Podcast: Clint Watts on Social Media Manipulation
sponsored by Cylance
PODCAST: Tune into this episode of the InSecurity Podcast, where host Matt Stephenson is joined by special guest Clint Watts, author and MSNBC national security contributor, as they discuss cyberattacks and hackers in the social media world.
Posted: 27 Aug 2018 | Premiered: Jun 18, 2018

Cylance

Pennsylvania Housing Finance Agency Replaces MSSP with AWN CyberSOC Service
sponsored by Arctic Wolf
CASE STUDY: Find out how the IT staff at the Pennsylvania Housing Finance Agency (PHFA) realized they needed to do more to address today's threat landscape, and why they selected a SOC-as-a-service to meet their security needs. Continue reading to uncover the challenges PFHA faced that led them to a new first line of defense.
Posted: 08 Aug 2018 | Published: 08 Aug 2018

Arctic Wolf

CSEA Case Study
sponsored by Radware
CASE STUDY: In this case study, learn how CSEA was able to safeguard its digital assets and ensure 100% business continuity for its customers.
Posted: 18 Jun 2018 | Published: 31 Dec 2017

Radware

Computer Weekly – 13 March 2018: Unlocking digital change in criminal justice
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the IT and digital chief at the Ministry of Justice about digital transformation across the criminal justice system. European cities are trying to attract British IT talent as a result of Brexit – what does it mean for UK IT? And we take an in-depth look at the fintech sector. Read the issue now.
Posted: 09 Mar 2018 | Published: 09 Mar 2018

ComputerWeekly.com

Government IT strategy & challenges in Australia
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, you can read more about the challenges that Australia's government is facing in bringing the country's national fibre network up to speed, its plans to push ahead with decryption laws and what it is doing to safeguard critical infrastructure from cyber-attacks.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

ComputerWeekly.com

The Investigatory Powers Act 2016 and Internet Connections Records
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
Posted: 09 May 2017 | Published: 09 May 2017

ComputerWeekly.com

Focus: IT for government and public sector
sponsored by ComputerWeekly.com
EGUIDE: It's been a busy few months for government IT as plans for a post-Brexit Britain are being drawn up. In this e-guide we look at the government's ideas for a prosperous post-Brexit Britain, and its ambitious 5G strategy.
Posted: 27 Mar 2017 | Published: 27 Mar 2017

ComputerWeekly.com

Computer Weekly – 14 March 2017: UK digital strategy lacks vision and ambition
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the UK government's new digital economy strategy and hear why critics labelled it unambitious and lacking imagination. The recent AWS cloud outage puts the spotlight on cloud and disaster recovery. And we look at the next generation of storage technology. Read the issue now.
Posted: 13 Mar 2017 | Published: 14 Mar 2017

ComputerWeekly.com

Recommendations on rolling back government surveillance
sponsored by ComputerWeekly.com
EBRIEF: Four former seniors staff from the US electronic intelligence gathering agency, the NSA, put the case for reform.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

ComputerWeekly.com

NSA insiders reveal what went wrong
sponsored by ComputerWeekly.com
EBRIEF: Former NSA employees explain how the agency missed vital intelligence on 9/11, broke the US constitution through mass surveillance against US citizens, and wasted billions of dollars on technology.
Posted: 30 Jun 2014 | Published: 30 Jun 2014

ComputerWeekly.com

What the Feds Think About AI and Cybersecurity
sponsored by IBM
RESOURCE: AI has a clear value for cybersecurity, but why does the government fear its use? Download this resource and explore the government's opinions of AI and cybersecruity.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

IBM

Proven Tactics to Handle Evidentiary Information in the Cloud
sponsored by AWS-Netapp
WHITE PAPER: In this quick guide, find out 5 pro tips for handling evidentiary information in the cloud, from how to anticipate evolving regulation stipulations, how to build secure hybrid cloud architecture, and more.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

AWS-Netapp

In Defense of Secure, Compliant Information Sharing
sponsored by Axway
RESOURCE: Find out how the Danish Defence selected the API platform that would best fit their needs, and explore the ins and outs of deploying in a secure DMZ.
Posted: 21 May 2018 | Published: 29 Dec 2017

Axway

Case Study: How the Diamond Model of Intrusion Analysis Unveiled Key Details About Malicious Activity
sponsored by ThreatConnect
WHITE PAPER: In the following case study, discover ways to gain a holistic view of threat intelligence and incident response so you can unite your entire security operations around a common defense, make informed business decisions, and more.
Posted: 01 May 2017 | Published: 01 May 2017

ThreatConnect

Digital Innovations and Changing Demographics are Redefining Government by the People, for the People
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Access this paper to learn about communicating with the different generations of people and how you'll have to handle your data. Learn how to find the right mix of traditional IT, cloud, security and mobility to provide the greatest service possible.
Posted: 07 Mar 2017 | Published: 30 Dec 2016

Hewlett Packard Enterprise

Comparative Analysis of Cybercriminal Groups: Buhtrap, Carbanak, and Metel
sponsored by Booz Allen Hamilton
WHITE PAPER: Learn about the Buhtrap, Carbanak and Metel cybercriminal groups in this white paper. Discover background on each group's operations over the years, what sort of damage they've done and what tools they've used to accomplish their malicious objectives.
Posted: 21 Oct 2016 | Published: 23 Mar 2016

Booz Allen Hamilton

The Security Risks of Network Sensors in the Enterprise
sponsored by IBM
EGUIDE: In this expert guide, discover more about network sensors and what they mean for your organization's well-being. Learn how cybercriminals can utilize network sensors for their own malicious deeds and what you can do to prevent hackers from stealing valuable enterprise secrets.
Posted: 17 Oct 2016 | Published: 11 Oct 2016

IBM

Computer Weekly – 5 July 2016: How will UK IT adapt after Brexit?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the aftershocks continue from the UK's decision to leave the European Union, we look at the implications and challenges for the UK technology community. Our latest buyer's guide examines expense management software. And IT leaders discuss the question – can you trust your technology? Read the issue now.
Posted: 05 Jul 2016 | Published: 05 Jul 2016

ComputerWeekly.com

Computer Weekly – 5 April 2016: Seven steps to digital leadership
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the key characteristics of successful leaders as digital transformation becomes a business priority. We examine Microsoft's plans for exploiting the internet of things. And we look back at British IT history after WW2 as part of Computer Weekly's 50th anniversary celebrations. Read the issue now.
Posted: 04 Apr 2016 | Published: 05 Apr 2016

ComputerWeekly.com

Endpoint Threat Detection Gets More Response
sponsored by Solarwinds MSP
EGUIDE: This white paper explains what cyber threats the United States faces on a daily basis and what tools they have to combat them.
Posted: 01 Feb 2016 | Published: 25 Jan 2016

Solarwinds MSP

Advanced Case Management for Government
sponsored by IBM
WHITE PAPER: How can you tap into today's data growth trend to improve processes? This white paper examines the drastic explosion of data and explores how governments have begun to handle this massive influx of information.
Posted: 02 Dec 2015 | Published: 02 Dec 2015

IBM

Computer Weekly – 11 August 2015: Data unlocks personalised customer service
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine how companies are starting to use big data analytics to deliver more personalised customer services. We talk to the government's IT procurement chief about improving public sector tech purchasing. And Volvo's CIO tells us how connected cars will reshape the automotive sector. Read the issue now.
Posted: 07 Aug 2015 | Published: 07 Aug 2015

ComputerWeekly.com

Profiling an Enigma: The Mystery of North Korea’s Cyber Threat Landscape
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This highly interesting resource delves into North Korea's cyber threat landscape, deeply analyzing what is known about the regime's capabilities and motives, which are largely shrouded in secrecy.
Posted: 05 Feb 2015 | Published: 29 Aug 2014

Hewlett Packard Enterprise
1 - 25 of 54 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement