Government Information Security Research
-
Continuous monitoring, remediation and CyberScope reporting
Sponsored by: IBMThis white paper explores an automated tool that can help government agencies gain and maintain key security compliance with the Federal Information Security Management Act (FISMA).
-
Computer Weekly 6 December 2011: Read this week’s issue of the UK’s leading technology publication, featuring news on open data, cyber security and our social media awards
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine the economic benefits of plans to release more government data for wider re-use by software developers. We announce the winners of our Social Media Awards, and hear what the IT industry thinks of the new UK cyber security strategy. Download the new issue now.
-
U.S. Army Relies on GlobalSCAPE® Secure Information Exchange Solutions to Protect Critical Data
Sponsored by: GlobalscapeNow you can get a file sharing solution that the U.S. Army uses and eliminate any worries you have about transferring sensitive business data. This case study will show you how this solution has been very successful for the Army and will teach you how your business could benefit a great deal as well.
-
Technical Guide on Government Security
Sponsored by: TechTarget SecurityInformation security practices of government organizations is at an all time high as attackers begin to focus on critical infrastructures and resources. This expert e-guide, presented by SearchSecurity.com, explores where government organizations need to direct their efforts in order to understand and properly mitigate critical threats.
-
Building Solutions For Smarter Governments: Six Ways to Increase Responsiveness, Service Quality, Accountability and Taxpayer Value
Sponsored by: IBMThis paper describes how smarter government means making operations and services truly citizen-centric, integrating their service delivery, coordinating programs and allowing a choice of access channels, as well as placing the most needed transactions on the Web.
-
Digital Trust in the Cloud: Liquid Security in Cloudy Places
Sponsored by: CSCWhile some individual users are experimenting with cloud processing, other users have already fully committed to the cloud as an important part of their enterprise architecture and operation. Read this white paper to learn about the evolution of cloud processing and whether or not the cloud processing boom will continue.
-
Presentation Transcript: WWW - World Wide Weaponization
Sponsored by: ESETThe growth of the internet brought about massively scalable distributed systems which have proved advantageous not only for governments, businesses and end-users, but also for criminals. In this webcast, review past, present, and future considerations regarding cybercrime, and discover next-generation methods of combating weaponized software.
-
The Critical Security Controls – Moving Beyond the Checklist Mentality
Sponsored by: LumensionThe "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.
-
Optimizing the PC Segment of California's IT Infrastructure
Sponsored by: Intel CorporationResearchers found that by creating a dynamic IT environment- standardized, centralized, automated, and mobile-California can achieve a greener, more secure computing complex that improves productivity, delivering greater efficiency at a lower cost to taxpayers and the environment.