Business of Information Technology  >   Business Environment  >   Political Environment  >  

Governments

RSS Feed   
DEFINITION: Political bodies exercising control and authority over a group of individuals by allocating resources based on laws and the command of the government.
Governments Reports
1 - 25 of 113 Matches Previous Page  |  Next Page
Rethinking Cyber Risk in a Re-globalized World with Andrea Little Limbago, VP Research and Analysis
sponsored by Interos
WEBCAST: The global pandemic has created seismic shifts in technology trends, particularly as they pertain to the global economy. Organizations are being driven to rethink their policies on security and risk. Engage this webinar, the Global Resilience Federation Virtual Summit on Security & Third-Party Risk, to explore emerging cyber risk considerations.
Posted: 23 Feb 2021 | Premiered: Nov 5, 2020

Interos

Has COVID-19 Made Local Government Less Cyber Secure?
sponsored by Zivver
RESOURCE: The rapid adoption of remote work capabilities has enabled organizations, who would have otherwise needed to pause operations, to remain operational – an especially important feat for local government agencies
Posted: 10 Feb 2021 | Published: 10 Feb 2021

Zivver

CyberArk Privileged Access Security for U.S. Federal Government Agencies
sponsored by Merlin International
WHITE PAPER: US federal government agencies are tasked with the difficult challenge of protecting sensitive data against both internal and external threats. This white paper explores the benefits of establishing a comprehensive Privileged Access Management (PAM) program to protect federal systems & data – read on to get started.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

Merlin International

Optimise digital user experience for all Australians
sponsored by Dynatrace
WHITE PAPER: Governments across Australia are working to improve citizen experiences. This paper demonstrates how end-to-end observability of cloud deployments can give agencies the intelligence needed to achieve the Federal Government’s three strategic priorities. Save the paper here for reference as these changes go into place.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

Dynatrace

Meeting NIST SP 800-207 with CyberArk
sponsored by Merlin International
RESOURCE CENTER: Embracing a Zero Trust security model is the official recommendation of the US House of Representatives – but how can US federal agencies align their methods with Zero Trust best practices? Read this report to learn about the core tents of the NIST Zero Trust Architecture (ZTA) and how agencies should work towards implementation.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Merlin International

A Risk-Based Approach to Insider Threat Detection for Federal Government Agencies
sponsored by Merlin International
WHITE PAPER: Malicious insiders, regardless of motive, continue to establish themselves as a major threat, especially amongst United States federal government agencies. This white paper offers comprehensive insights into the role of privileged access management as an effective countermeasure against insider threats – read on to get started.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Merlin International

Harnessing The Cloud And Data Analytics For Safer, More Secure Elections
sponsored by Carahsoft
WHITE PAPER: The integrity of US elections is pivotal in protecting American democracy. Through digital transformation and technology modernization, state and local governments can bolster their election management and security capabilities. Read this brief for a closer look at how cloud and data analytics can enable safer, more secure elections.
Posted: 25 Jan 2021 | Published: 25 Jan 2021


Safeguarding Democracy: A Guide To Strengthening Election Security
sponsored by Carahsoft
EGUIDE: Elections are a cornerstone of our democracy – therefore the security and integrity of elections is of the utmost importance. Read this e-guide for comprehensive insight into the current state of election systems and infrastructures, threats targeting our systems and best practices for better election security.
Posted: 22 Jan 2021 | Published: 22 Jan 2021


Citizen360 Use Case
sponsored by Ascention
PRODUCT OVERVIEW: Download this white paper to learn about Citizen360, a solution designed to help these organizations respond to Government Agencies and Service Providers quickly and effectively, and the top use cases it can support.
Posted: 22 Jan 2021 | Published: 22 Jan 2021

Ascention

Introducing Citizen360 by Ascention
sponsored by Ascention
PRODUCT OVERVIEW: Citizen360 is a data platform designed to help government services manage consumer data and experiences. It will be launched in Australia and New Zealand during the 2020/21 financial year with plans to go global in the following year. Learn more about it in this product overview.
Posted: 22 Jan 2021 | Published: 22 Jan 2021

Ascention

UK police unlawfully processing over a million people's data on Microsoft 365
sponsored by ComputerWeekly.com
EGUIDE: The roll-out of Microsoft 365 to dozens of UK police forces may be unlawful, because many have failed to conduct data protection checks before deployment and hold no information on their contracts.
Posted: 21 Dec 2020 | Published: 21 Dec 2020

ComputerWeekly.com

NIST SP 800-171 and CUI
sponsored by HelpSystems
PRODUCT OVERVIEW: Both the CUI and NIST SP 800-171 programs are designed to standardized how government agencies (federal or nonfederal) manage and protect unclassified information – but ensuring compliance can be tricky. Read this solution brief to see how Titus is helping contractors comply with each of these requirements.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

HelpSystems

Seamless Transition to CUI Markings
sponsored by HelpSystems
PRODUCT OVERVIEW: The Controlled Unclassified Information (CUI) program was implemented to standardize how government agencies safeguard unclassified information – however the program can be complex and time-consuming. Read this solution brief to learn about how Titus is helping agencies reduce the time and stress of a CUI program.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

HelpSystems

How a Northeastern State Strengthened Application Security for their Voter Registration System
sponsored by WhiteHat Security
CASE STUDY: Elections are very heavily targeted by threat actors. Troublemakers as they are, these actors will go to great lengths to breach voter privacy, even by accessing user information to impersonate voters. One state recognized this and wanted to ensure the security of their voter registration apps. See this case study to learn how they did it.
Posted: 02 Dec 2020 | Published: 02 Dec 2020

WhiteHat Security

Computer Weekly – 24 November 2020: Covid accelerates tech innovation in the NHS
sponsored by ComputerWeekly.com
EZINE: In this issue of Computer Weekly, we look at the track and trace app, which was redeveloped and enhanced at breakneck speed, and explore how the pandemic has accelerated the roll-out of new technology such as artificial intelligence and video conferencing tools at NHS trusts. We also present some research into how Covid has affected IT spending.
Posted: 23 Nov 2020 | Published: 24 Nov 2020

ComputerWeekly.com

2020 Election Security
sponsored by WhiteHat Security
WHITE PAPER: Around the globe, we’ve witnessed how cybercriminals can create chaos during election cycles by disqualifying legitimate voters, corrupting voter data and launching denial-of-service attacks. In recent years, U.S. elections have come under continuous assault. See this white paper to learn about the security challenges this causes for the country.
Posted: 17 Nov 2020 | Published: 17 Nov 2020

WhiteHat Security

IT Priorities 2020: European IT budget share reflects home-working challenges brought by Covid
sponsored by ComputerWeekly.com
EGUIDE: European organisations are being forced to redivert more limited budgets during the pandemic. This Eguide dives into the reasons as to how and why this shift is occurring in IT companies across the continent.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

ComputerWeekly.com

Computer Weekly – 29 September 2020: How supply chain management is changing after Covid-19
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the profound changes in supply chain management as a result of the global pandemic. We find out how digital experience platforms can help deliver an omni-channel web presence. And we look at the role of technology in cracking down on international money laundering. Read the issue now.
Posted: 28 Sep 2020 | Published: 29 Sep 2020

ComputerWeekly.com

Cybersecurity Compliance Guide
sponsored by Arctic Wolf Networks, Inc.
EGUIDE: Consumer data protection has become so heavily regulated that compliance is now a key part of any cybersecurity program. In order to better understand the various regulations and their implications, Arctic Wolf created this Cybersecurity Compliance Guide, which explores relevant regulations across industries and geography.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

Arctic Wolf Networks, Inc.

Australia's cybersecurity game plan
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, find out how the Australian government is tackling cyber security issues head-on, why local businesses continue to fall prey to ransomware and how to mitigate supply chain security risks.
Posted: 23 Aug 2020 | Published: 24 Aug 2020

ComputerWeekly.com

Implementing the NIST Cybersecurity Framework in Government
sponsored by Absolute Software Corporation
WHITE PAPER: The NIST Cybersecurity Framework outlines 5 functions that, when implemented properly, help organizations drive efficiency while ensuring data security. In this whitepaper focuses on how the NIST Cybersecurity Framework can – and should – be implemented to address the rising cybersecurity challenges in the public sector.
Posted: 30 Jul 2020 | Published: 30 Jul 2020

Absolute Software Corporation

Better governance, one API at a time
sponsored by Axway
WHITE PAPER: In this report, learn how governments are adopting an API-first approach in their digital transformation strategies.
Posted: 23 Jun 2020 | Published: 23 Jun 2020

TOPICS:  Governments
Axway

Election System Security Starts at the Network
sponsored by Cradlepoint
WEBCAST: There’s a spotlight on cybersecurity that is pushing local, county, and state officials to update and fortify elections systems. Download this webcast to learn how election system security starts at the network.
Posted: 15 Jun 2020 | Premiered: Mar 10, 2020

Cradlepoint

Computer Weekly - 5 May 2020: The role of AI in the war against pandemics
sponsored by ComputerWeekly.com
EGUIDE: In this week's Computer Weekly, we look at how AI and data science are supporting the global push to deal with the coronavirus pandemic. We reveal, and talk to, the man behind the world's first computer virus pandemic, the Love Bug. And we examine how the IT services market will change as a result of the current crisis. Read the issue now.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

ComputerWeekly.com

IT Security Challenges for State and Local Government IT Departments
sponsored by Dell Technologies
RESOURCE: Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.
Posted: 12 May 2020 | Published: 12 May 2020

Dell Technologies
1 - 25 of 113 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info