Business of Information Technology  >   Business Environment  >   Political Environment  >   Governments  >  

Municipal Government

RSS Feed   
Municipal Government Reports
 
Moorabool Shire Council Case Study
sponsored by mimecast
CASE STUDY: In this case study, discover how Moorabool Shire Council was able to immediately reduce the number of phishing and whaling attacks in order to reduce IT workload while maintaining security for the 250 email users within their municipality.
Posted: 10 Dec 2019 | Published: 10 Dec 2019

mimecast

How Privileged Access Management Protects State and Local Agencies
sponsored by Cyber-Ark Software
PRODUCT OVERVIEW: Ensuring the security of personally identifiable information (PII) is a key responsibility for state and local government agencies. In this solution brief, explore the features and capabilities of the Privileged Access Management platform and discover how agencies are leveraging it to enhance their security posture and protect access to PII.
Posted: 02 Apr 2020 | Published: 02 Apr 2020

Cyber-Ark Software

The State and Local Cybersecurity Crisis
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Ransomware attacks are rising threat for government agencies. In 2019 alone, 22 cities experienced ransomware attacks – causing financial and reputational damage for agencies already facing budgetary constraints. Download this white paper to take a closer look at where the vulnerabilities lie & tactics that can help fill the resource gap.
Posted: 31 Jan 2020 | Published: 31 Jan 2020

Arctic Wolf Networks, Inc.

Mitigating Security Risks for State and Local Government
sponsored by Cyber-Ark Software
WEBCAST: Privileged access management (PAM) is a scalable approach to security that focuses on users rather than relying on a perimeter. The nature of PAM is especially beneficial for addressing the challenges that state & local government agencies face today. Watch this webinar to learn more about PAM and view a demo of CyberArk’s PAM offering.
Posted: 03 Apr 2020 | Premiered: Apr 3, 2020

Cyber-Ark Software

Best Practices for Securing Critical Infrastructure for State & Local Governments
sponsored by VMware International Unlimited Company
WHITE PAPER: For state and local governments, managing cyberthreats and ensuring election security is made even more difficult by the lack of resources available. This white paper underlines the importance of government cybersecurity and highlights 10 best practices agencies can implement to better protect themselves and those they govern.
Posted: 07 May 2020 | Published: 31 Jan 2020

VMware International Unlimited Company

Security in the Face of Disaster
sponsored by Motorola, Inc.
CASE STUDY: Read this white paper to learn how a New Orleans-based systems integrator relied on Motorola's Canopy® wireless broadband platform to bring better communications and security to New Orleans.
Posted: 08 Jun 2007 | Published: 01 Jan 2006

Motorola, Inc.

Cybersecurity Maturity Model Certification (CMMC)
sponsored by BlueVoyant
WHITE PAPER: The Cybersecurity Maturity Model Certification (CMMC) is a new cybersecurity requirement for DoD contractors and subcontractors designed to protect the handling of Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). But what does the CMMC entail, and when will it come into effect? Read on to find out.
Posted: 08 May 2020 | Published: 08 May 2020

BlueVoyant

Computer Weekly – 4 December 2018: Tackling legacy systems by making IT evergreen
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we assess strategies for continuous IT improvement to help evergreen IT replace legacy tech. Our new buyer's guide examines next-generation networking technologies such as SD-WAN. And we hear about digital transformation in the charity sector in an interview with the IT leader at Parkinson's UK. Read the issue now.
Posted: 30 Nov 2018 | Published: 30 Nov 2018

ComputerWeekly.com

An Overview of Supply Chain Essentials
sponsored by GIB
WHITE PAPER: From optimizing stock inventory to accelerating supply readiness, supply chain management is a balancing act that can be difficult to master. But GIB Controlling can help you. The SAP-certified suite optimizes your stock for the long term – while expending the minimum amount of time and resources. Learn about it in this product overview.
Posted: 21 Nov 2019 | Published: 21 Nov 2019

GIB

Top 10 Middle East stories of 2018
sponsored by ComputerWeekly.com
EGUIDE: With money to invest and well-educated populations, the region is using advanced technology to enhance business as well as the quality of life. Read this top 10 for more examples of digital transformation in the Middle East.
Posted: 09 Jan 2019 | Published: 09 Jan 2019

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info