IT Management  >   Systems Operations  >   Security  >   Information Security  >  

Government Information Security

RSS Feed   
ALSO CALLED: Government Security
DEFINITION: Ensuring the confidentiality of sensitive information processed by, stored in, and moved through information systems and applications belonging to the government and government agencies.
Government Information Security Reports
1 - 25 of 51 Matches Previous Page  |  Next Page
How Okta's IT + Workplace Teams Are Getting Ready for Dynamic Work
sponsored by Okta
VIDEO: Before the COVID-19 outbreak, few government employees (federal, state and local) had the ability and authorization to work from home. Watch this webinar to learn what the new normal looks like for government agencies, the challenges that have surfaced and best practices for addressing them.
Posted: 28 Sep 2020 | Premiered: 28 Sep 2020

Okta

Cybersecurity Compliance Guide
sponsored by Arctic Wolf Networks, Inc.
EGUIDE: Consumer data protection has become so heavily regulated that compliance is now a key part of any cybersecurity program. In order to better understand the various regulations and their implications, Arctic Wolf created this Cybersecurity Compliance Guide, which explores relevant regulations across industries and geography.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

Arctic Wolf Networks, Inc.

Security Without Compromise
sponsored by Remediant
CASE STUDY: As a result of a mandate, a major U.S. government contractor was in search of a highly-scalable solution that could couple multi-factor authentication and dynamic privileged access – and it had to be efficient and compliant. As it turned out, they were able to get what they needed and more. Take a look at this case study to learn the specifics.
Posted: 17 Aug 2020 | Published: 17 Aug 2020

Remediant

Deep-Dive into MLPS 2.0 Compliance with Alibaba Cloud Solution
sponsored by Alibaba Cloud
WEBCAST: As of Dec. 1, 2019, China has introduced a new version of their multi-level protection scheme law known as MLPS 2.0. As such, the Chinese government has updated its pre-existing requirement that individual 'network operators' in China must implement and maintain an MLPS with respect to their networks. Watch this webcast to get more details.
Posted: 17 Aug 2020 | Premiered: Aug 17, 2020

Alibaba Cloud

TikTok Case Study
sponsored by Lookout
WHITE PAPER: Social media companies have been known to breach privacy laws regarding user data, and TikTok, a video sharing app, may be the latest culprit. US, Chinese and Russian governments are all of the belief that TikTok is covertly being used to collect user data, and organizations are digging to find answers. Open this white paper to learn more.
Posted: 24 Jul 2020 | Published: 24 Jul 2020

Lookout

RSAC Resource Guide: U.S. Election Security 2020
sponsored by RSA Conference
EGUIDE: Many cybersecurity experts have expressed concerns about the security of the upcoming U.S. elections. This RSAC Resource Guide: U.S. Election Security 2020 compiles expertise from industry leaders to provide readers with the insight and information they need to understand this topic.
Posted: 06 Jul 2020 | Published: 06 Jul 2020

RSA Conference

How to Ensure NIAP Mobile Application Compliance
sponsored by NowSecure
WHITE PAPER: Mobile applications allow for improved business operations and more seamless experience. However, for federal agencies, the heavy burden of ensuring each app meets the National Information Assurance Partnership (NIAP) security requirements causes a massive roadblock. Download this white paper to learn ease this headache.
Posted: 19 Jun 2020 | Published: 19 Jun 2020

NowSecure

Connecting Technologies that Protect First Responders and Communities
sponsored by CradlePoint
VIDEO: In this video, learn how Cradlepoint can help provide the secure connectivity that first responders including police, fire, and EMS agencies need to leverage critical technologies and access up-to-date information 24x7.
Posted: 20 May 2020 | Premiered: 04 May 2020

CradlePoint

Cybersecurity Maturity Model Certification (CMMC)
sponsored by BlueVoyant
WHITE PAPER: The Cybersecurity Maturity Model Certification (CMMC) is a new cybersecurity requirement for DoD contractors and subcontractors designed to protect the handling of Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). But what does the CMMC entail, and when will it come into effect? Read on to find out.
Posted: 08 May 2020 | Published: 08 May 2020

BlueVoyant

Best Practices for Securing Critical Infrastructure for State & Local Governments
sponsored by VMware International Unlimited Company
WHITE PAPER: For state and local governments, managing cyberthreats and ensuring election security is made even more difficult by the lack of resources available. This white paper underlines the importance of government cybersecurity and highlights 10 best practices agencies can implement to better protect themselves and those they govern.
Posted: 07 May 2020 | Published: 31 Jan 2020

VMware International Unlimited Company

How Government Agencies Can Enhance Security and Reduce Costs
sponsored by ServiceNow
WHITE PAPER: IT security teams in the public sector are challenged with providing security and innovation while driving down costs. Download this report to take a closer look at the challenges plaguing government agencies and discover a platform that can help to facilitate innovation without exhausting resources.
Posted: 06 Feb 2020 | Published: 31 Jan 2018

ServiceNow

Government Agency Embraces Domain Intelligence to Pre-emptively Block Threats
sponsored by DomainTools
CASE STUDY: In this case study, discover how a major metropolitan government agency was able to incorporate a platform that enabled them to anticipate & block threats before they breach the perimeter and utilize their existing data to improve their collective intelligence to optimize IT resources. Download the report to take a closer look.
Posted: 31 Jan 2020 | Published: 31 Jan 2020

DomainTools

The State of Texas protects its data with a Defense in Depth cybersecurity strategy
sponsored by Capgemini
CASE STUDY: In this case study, uncover how the State of Texas Department of Information Resources developed a holistic security strategy in order to preserve the privacy of citizen data and protect personally identifiable information for users across the state.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

Capgemini

Computer Weekly – 7 May 2019: Nurturing innovation at DWP
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how the Department for Work and Pensions (DWP) is managing digital innovation. We look at Anthos, Google's new multicloud platform. And we report from the NCSC cyber security conference where experts discussed the lessons learned from recent high-profile attacks. Read the issue now.
Posted: 03 May 2019 | Published: 03 May 2019

ComputerWeekly.com

Computer Weekly – 23 October 2018: Where next for digital identity?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the government hands its digital identity service, Gov.uk Verify, to the private sector, we examine the history and prospects for the troubled system. Our latest buyer's guide looks at cloud-native architecture. And we compare the flash storage capabilities of the leading cloud providers. Read the issue now.
Posted: 19 Oct 2018 | Published: 19 Oct 2018

ComputerWeekly.com

Computer Weekly – 13 March 2018: Unlocking digital change in criminal justice
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the IT and digital chief at the Ministry of Justice about digital transformation across the criminal justice system. European cities are trying to attract British IT talent as a result of Brexit – what does it mean for UK IT? And we take an in-depth look at the fintech sector. Read the issue now.
Posted: 09 Mar 2018 | Published: 09 Mar 2018

ComputerWeekly.com

Government IT strategy & challenges in Australia
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, you can read more about the challenges that Australia's government is facing in bringing the country's national fibre network up to speed, its plans to push ahead with decryption laws and what it is doing to safeguard critical infrastructure from cyber-attacks.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

ComputerWeekly.com

The Investigatory Powers Act 2016 and Internet Connections Records
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
Posted: 09 May 2017 | Published: 09 May 2017

ComputerWeekly.com

Focus: IT for government and public sector
sponsored by ComputerWeekly.com
EGUIDE: It's been a busy few months for government IT as plans for a post-Brexit Britain are being drawn up. In this e-guide we look at the government's ideas for a prosperous post-Brexit Britain, and its ambitious 5G strategy.
Posted: 27 Mar 2017 | Published: 27 Mar 2017

ComputerWeekly.com

Computer Weekly – 14 March 2017: UK digital strategy lacks vision and ambition
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the UK government's new digital economy strategy and hear why critics labelled it unambitious and lacking imagination. The recent AWS cloud outage puts the spotlight on cloud and disaster recovery. And we look at the next generation of storage technology. Read the issue now.
Posted: 13 Mar 2017 | Published: 14 Mar 2017

ComputerWeekly.com

IT Security Challenges for State and Local Government IT Departments
sponsored by Dell Technologies
RESOURCE: Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.
Posted: 12 May 2020 | Published: 12 May 2020

Dell Technologies

State and Local Governments Chart Their Path Toward Improved Digital Security
sponsored by Dell Technologies
RESOURCE: State and local governments are under attack from cyberespionage and malware, and they are exposed to a broad variety of security risks. New approaches are needed to make government IT less vulnerable. In this infographic, learn 7 best practices for cybersecurity in state and local governments.
Posted: 12 May 2020 | Published: 12 May 2020

Dell Technologies

The Security Risks of Network Sensors in the Enterprise
sponsored by IBM
EGUIDE: In this expert guide, discover more about network sensors and what they mean for your organization's well-being. Learn how cybercriminals can utilize network sensors for their own malicious deeds and what you can do to prevent hackers from stealing valuable enterprise secrets.
Posted: 17 Oct 2016 | Published: 11 Oct 2016

IBM

Computer Weekly – 5 July 2016: How will UK IT adapt after Brexit?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the aftershocks continue from the UK's decision to leave the European Union, we look at the implications and challenges for the UK technology community. Our latest buyer's guide examines expense management software. And IT leaders discuss the question – can you trust your technology? Read the issue now.
Posted: 05 Jul 2016 | Published: 05 Jul 2016

ComputerWeekly.com

Computer Weekly – 5 April 2016: Seven steps to digital leadership
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the key characteristics of successful leaders as digital transformation becomes a business priority. We examine Microsoft's plans for exploiting the internet of things. And we look back at British IT history after WW2 as part of Computer Weekly's 50th anniversary celebrations. Read the issue now.
Posted: 04 Apr 2016 | Published: 05 Apr 2016

ComputerWeekly.com
1 - 25 of 51 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info