ComputerWeekly.com Research Library

Powered by Bitpipe.com

Government Agencies (U.S.) Research

  • RSAC Resource Guide: U.S. Election Security 2020

    Sponsored by: RSA Conference

    Many cybersecurity experts have expressed concerns about the security of the upcoming U.S. elections. This RSAC Resource Guide: U.S. Election Security 2020 compiles expertise from industry leaders to provide readers with the insight and information they need to understand this topic.

  • How to Ensure NIAP Mobile Application Compliance

    Sponsored by: NowSecure

    Mobile applications allow for improved business operations and more seamless experience. However, for federal agencies, the heavy burden of ensuring each app meets the National Information Assurance Partnership (NIAP) security requirements causes a massive roadblock. Download this white paper to learn ease this headache.

  • Implementing the NIST Cybersecurity Framework in Government

    Sponsored by: Absolute Software Corporation

    Download this white paper to discover the 5 functions of the NIST cybersecurity framework and why CIOs and CISOs in the public sector should follow this framework in order to best optimize their security approach without exhausting their decreasing budgets.

  • Hack the Pentagon Case Study

    Sponsored by: Synack

    The goal of the Department of Defense’s recent “Hack the Pentagon” program was to mimic realistic cyber threats and assess their critical systems responded to attack from nation states. Read on to unlock the results of this case study and discover why crowdsourced security testing is the new standard for the government.

  • Cybersecurity Maturity Model Certification (CMMC)

    Sponsored by: BlueVoyant

    The Cybersecurity Maturity Model Certification (CMMC) is a new cybersecurity requirement for DoD contractors and subcontractors designed to protect the handling of Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). But what does the CMMC entail, and when will it come into effect? Read on to find out.

  • Best Practices for Securing Critical Infrastructure for State & Local Governments

    Sponsored by: VMware International Unlimited Company

    For state and local governments, managing cyberthreats and ensuring election security is made even more difficult by the lack of resources available. This white paper underlines the importance of government cybersecurity and highlights 10 best practices agencies can implement to better protect themselves and those they govern.

  • DCOI for Dummies

    Sponsored by: Nlyte Software

    Initially slated for the end of 2018, the Data Center Optimization Initiative (DCOI) has been officially extended to the end of the fiscal year 2020, now bundled into the sweeping government project known as Cloud Smart. Inside this For Dummies guide, take a closer look at what the DCOI includes.

  • Reducing Government Budget Deficits by Attacking Fraud, Waste and Abuse

    Sponsored by: SAS

    Government fraud is at an all-time high and growing rapidly. In fact, research shows that it accounts for roughly 10% of overall government spending. But what if governments could minimize deficits by eliminating fraud, waste and abuse? Download this white paper to discover the benefits of an enterprise approach to fraud.

  • Exploring AI Use Cases Across Education and Government

    Sponsored by: Dell Technologies

    Artificial intelligence has the potential to transform how public sector and educational institutions operate, innovate and serve the needs of their constituents. Read onward to learn AI use cases already starting to emerge across education and public sector organizations– and what use cases to look forward to in the future.

  • How Government Agencies Can Enhance Security and Reduce Costs

    Sponsored by: ServiceNow

    IT security teams in the public sector are challenged with providing security and innovation while driving down costs. Download this report to take a closer look at the challenges plaguing government agencies and discover a platform that can help to facilitate innovation without exhausting resources.

  • Government Agency Embraces Domain Intelligence to Pre-emptively Block Threats

    Sponsored by: DomainTools

    In this case study, discover how a major metropolitan government agency was able to incorporate a platform that enabled them to anticipate & block threats before they breach the perimeter and utilize their existing data to improve their collective intelligence to optimize IT resources. Download the report to take a closer look.

  • The State and Local Cybersecurity Crisis

    Sponsored by: Arctic Wolf Networks, Inc.

    Ransomware attacks are rising threat for government agencies. In 2019 alone, 22 cities experienced ransomware attacks – causing financial and reputational damage for agencies already facing budgetary constraints. Download this white paper to take a closer look at where the vulnerabilities lie & tactics that can help fill the resource gap.

  • The State of Texas protects its data with a Defense in Depth cybersecurity strategy

    Sponsored by: Capgemini

    In this case study, uncover how the State of Texas Department of Information Resources developed a holistic security strategy in order to preserve the privacy of citizen data and protect personally identifiable information for users across the state.

  • State of Georgia Becomes an Adaptive Provider of Modern IT Services

    Sponsored by: Capgemini

    Inside, learn how the Georgia Enterprise Technology Services (GETS) program, the IT infrastructure and network services provider for the state’s 89 executive branch agencies, consolidated its server and network resources to create an efficient, multi-service IT ecosystem.

  • Transforming the Delivery of Government Services the Texas Way

    Sponsored by: Capgemini

    Inside this publication, learn how the state of Texas’ Department of Information Resources (DIR) utilized a multi-sourcing service integration model to guide its digital transformation efforts – earning the ability to deliver world-class IT services to agencies across the state.

  • 5 Ways Technology Can Transform Government Operations

    Sponsored by: Smartsheet

    In this whitepaper, learn how governments and agencies can improve the success rate of their transformation journey by switching to a reliable cloud-based application. Review your software options with Smartsheet, and discover how cloud-based applications can help your organization drive progress towards digital transformation in 5 critical ways.

  • Recommendations on rolling back government surveillance

    Sponsored by: ComputerWeekly.com

    Four former seniors staff from the US electronic intelligence gathering agency, the NSA, put the case for reform.

  • NSA insiders reveal what went wrong

    Sponsored by: ComputerWeekly.com

    Former NSA employees explain how the agency missed vital intelligence on 9/11, broke the US constitution through mass surveillance against US citizens, and wasted billions of dollars on technology.

  • Endpoint Threat Detection Gets More Response

    Sponsored by: Solarwinds MSP

    This white paper explains what cyber threats the United States faces on a daily basis and what tools they have to combat them.

  • Advanced Case Management for Government

    Sponsored by: IBM

    How can you tap into today's data growth trend to improve processes? This white paper examines the drastic explosion of data and explores how governments have begun to handle this massive influx of information.

  • Essential Supplier Report: Smart City Suppliers

    Sponsored by: IBM

    This report cuts to the chase when it comes to suppliers focusing on smart cities and forwar-thinking municipalities. Read now for evaluations on leading players in the market that have the capacity to provide leadership on large-scale projects spanning multiple city requirements.

  • Smart City as a Service: Using Analytics to Equip Communities for Data Driven Decisions

    Sponsored by: IBM

    This white paper how to enable municipal IT managers to build a flexible cloud foundation and support a smart city service strategy. Read on to discover how to deploy on a secure hybrid cloud model to accommodate all workloads.

  • Protecting Critical Data is a Main Priority for the U.S. Army

    Sponsored by: Globalscape

    In this white paper, learn how the U.S. Army can protect their $68 billion-worth of annual data with a set of security solutions that easily integrate with their Standard Army Management Information System (STAMIS).

  • Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness

    Sponsored by: IBM

    This white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates.

  • Guard Data In Government Environments by Implementing Continuous Diagnostics and Mitigation

    Sponsored by: IBM

    This resource features a cost-effective automated diagnostics and mitigation security solution that offers continuous protection and is easily integrated with existing systems.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.