ComputerWeekly.com Research Library

Powered by Bitpipe.com

Government Information Security White Papers

  • State and Local Governments Chart Their Path Toward Improved Digital Security

    Sponsored by: Dell Technologies

    State and local governments are under attack from cyberespionage and malware, and they are exposed to a broad variety of security risks. New approaches are needed to make government IT less vulnerable. In this infographic, learn 7 best practices for cybersecurity in state and local governments.

  • IT Security Challenges for State and Local Government IT Departments

    Sponsored by: Dell Technologies

    Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.

  • 2019 Financial Consumer Cybersecurity Threat Index

    Sponsored by: Morphisec, Inc.

    As Morphisec continues to assist financial providers with improving defenses and protecting consumer financial data and funds, they decided to examine how the increasing amount of financial cyberattacks are impacting the mindset of consumers. Download Morphisec's 2019 U.S. Consumer Financial Cybersecurity Threat Index to see what they found.

  • Personnel Administration and Security Solution for Federal Agencies

    Sponsored by: Appian

    In this white paper, learn how the Appian Personnel Administration and Security Solution (PASS) can help create a unified view of people and investigations in order to improve the efficiency and effectiveness of personnel security administration.

  • Computer Weekly – 7 May 2019: Nurturing innovation at DWP

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we find out how the Department for Work and Pensions (DWP) is managing digital innovation. We look at Anthos, Google's new multicloud platform. And we report from the NCSC cyber security conference where experts discussed the lessons learned from recent high-profile attacks. Read the issue now.

  • Protecting Government Assets

    Sponsored by: Dell

    Take a look at this infographic to find out how thin clients can provide government organizations at the local, regional, and federal levels with a secure platform that enables IT to meet strict government mandates to access highly sensitive information.

  • Computer Weekly – 23 October 2018: Where next for digital identity?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as the government hands its digital identity service, Gov.uk Verify, to the private sector, we examine the history and prospects for the troubled system. Our latest buyer's guide looks at cloud-native architecture. And we compare the flash storage capabilities of the leading cloud providers. Read the issue now.

  • Pennsylvania Housing Finance Agency Replaces MSSP with AWN CyberSOC Service

    Sponsored by: Arctic Wolf

    Find out how the IT staff at the Pennsylvania Housing Finance Agency (PHFA) realized they needed to do more to address today's threat landscape, and why they selected a SOC-as-a-service to meet their security needs. Continue reading to uncover the challenges PFHA faced that led them to a new first line of defense.

  • Computer Weekly – 13 March 2018: Unlocking digital change in criminal justice

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we talk to the IT and digital chief at the Ministry of Justice about digital transformation across the criminal justice system. European cities are trying to attract British IT talent as a result of Brexit – what does it mean for UK IT? And we take an in-depth look at the fintech sector. Read the issue now.

  • Government IT strategy & challenges in Australia

    Sponsored by: ComputerWeekly.com

    In this e-guide, you can read more about the challenges that Australia's government is facing in bringing the country's national fibre network up to speed, its plans to push ahead with decryption laws and what it is doing to safeguard critical infrastructure from cyber-attacks.

  • The Investigatory Powers Act 2016 and Internet Connections Records

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.

  • Focus: IT for government and public sector

    Sponsored by: ComputerWeekly.com

    It's been a busy few months for government IT as plans for a post-Brexit Britain are being drawn up. In this e-guide we look at the government's ideas for a prosperous post-Brexit Britain, and its ambitious 5G strategy.

  • Computer Weekly – 14 March 2017: UK digital strategy lacks vision and ambition

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we examine the UK government's new digital economy strategy and hear why critics labelled it unambitious and lacking imagination. The recent AWS cloud outage puts the spotlight on cloud and disaster recovery. And we look at the next generation of storage technology. Read the issue now.

  • Recommendations on rolling back government surveillance

    Sponsored by: ComputerWeekly.com

    Four former seniors staff from the US electronic intelligence gathering agency, the NSA, put the case for reform.

  • NSA insiders reveal what went wrong

    Sponsored by: ComputerWeekly.com

    Former NSA employees explain how the agency missed vital intelligence on 9/11, broke the US constitution through mass surveillance against US citizens, and wasted billions of dollars on technology.

  • The Security Risks of Network Sensors in the Enterprise

    Sponsored by: IBM

    In this expert guide, discover more about network sensors and what they mean for your organization's well-being. Learn how cybercriminals can utilize network sensors for their own malicious deeds and what you can do to prevent hackers from stealing valuable enterprise secrets.

  • Computer Weekly – 5 July 2016: How will UK IT adapt after Brexit?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as the aftershocks continue from the UK's decision to leave the European Union, we look at the implications and challenges for the UK technology community. Our latest buyer's guide examines expense management software. And IT leaders discuss the question – can you trust your technology? Read the issue now.

  • Computer Weekly – 5 April 2016: Seven steps to digital leadership

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we look at the key characteristics of successful leaders as digital transformation becomes a business priority. We examine Microsoft's plans for exploiting the internet of things. And we look back at British IT history after WW2 as part of Computer Weekly's 50th anniversary celebrations. Read the issue now.

  • Endpoint Threat Detection Gets More Response

    Sponsored by: Solarwinds MSP

    This white paper explains what cyber threats the United States faces on a daily basis and what tools they have to combat them.

  • Advanced Case Management for Government

    Sponsored by: IBM

    How can you tap into today's data growth trend to improve processes? This white paper examines the drastic explosion of data and explores how governments have begun to handle this massive influx of information.

  • Computer Weekly – 11 August 2015: Data unlocks personalised customer service

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we examine how companies are starting to use big data analytics to deliver more personalised customer services. We talk to the government's IT procurement chief about improving public sector tech purchasing. And Volvo's CIO tells us how connected cars will reshape the automotive sector. Read the issue now.

  • Protecting Critical Data is a Main Priority for the U.S. Army

    Sponsored by: Globalscape

    In this white paper, learn how the U.S. Army can protect their $68 billion-worth of annual data with a set of security solutions that easily integrate with their Standard Army Management Information System (STAMIS).

  • Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness

    Sponsored by: IBM

    This white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates.

  • Guard Data In Government Environments by Implementing Continuous Diagnostics and Mitigation

    Sponsored by: IBM

    This resource features a cost-effective automated diagnostics and mitigation security solution that offers continuous protection and is easily integrated with existing systems.

  • Improved Scalability and Availability are the Keys to Better Storage Management

    Sponsored by: EMC & Arrow

    This white paper highlights the benefits of scale-out NAS solution from EMC that can keep up with exponential data growth, increased regulations and compliance mandates. This solution provides the flexibility and availability that traditional storage approaches can't provide.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.