It Build Government CyberWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: It Build Government Cyber returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Security Policies
 •   Security Monitoring
 •   Managed Security Services
 •   Application Security
 •   Vulnerability Assessment
 •   Endpoint Security
 •   Wireless Security
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Functions Of It Build
 •   It Build Contact
 •   It Build Contracts
 •   It Build Digital
 •   It Build Government Consultant
 •   It Build Government Reviews
 •   It International
 •   It Patent
 •   Roi It Build Government
 •   Samples It Build Government
Advertisement

ALL RESULTS
1 - 25 of 474 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Architecting Enterprise Social Computing for Business Value by NewsGator

October 01, 2008 - (Free Research)
This paper builds a model of enterprise social computing by analyzing business goals. It builds the architectural components and the relationships between them by starting from a basic definition of social computing and the most common goals. 
(WHITE PAPER) READ ABSTRACT |

Building Capabilities Leveraging Alternate Solution Deployments by SAP America, Inc.

June 30, 2011 - (Free Research)
This white paper explores the delivery methods and strategies for achieving versatile, agile and powerful IT capabilities. Inside, learn about the need for service and application orchestration, as well as cutting edge strategies for meeting a new generation of business needs. 
(WHITE PAPER) READ ABSTRACT |

The Top Five Virtualization Mistakes by Vyatta Inc.

June 01, 2007 - (Free Research)
This paper describes five mistakes common to many implementations of enterprise virtualization. Most of these mistakes relate to virtualization and networking infrastructure. Ideally, after reading this paper, you'll be sensitized to these issues so that you can plan for them and make your virtualization projects more successful. 
(WHITE PAPER) READ ABSTRACT |

Dialing for Dollars: Nine Tips on Call Prospecting by Cisco Systems, Inc.

January 20, 2011 - (Free Research)
The truth about effective call prospecting is that it’s a numbers game: the more calls you make, the better your chance of attaining customers. Just one customer could be enough to make your sales numbers. Continue reading this paper to learn nine tips for effective calling. 
(WHITE PAPER) READ ABSTRACT |

Cyber Defense Managed Service - A Force Multiplier Webinar by Verdasys (E-mail this company)

June 27, 2013 - (Free Research)
Join security expert and CISO of In-Q-Tel Dan Geer and Verdasys in this upcoming webcast as they discuss a new deployment model and next-gen technology that can provide rapid deployment, immediate detection and comprehensive prevention operations for companies of any size. 
(VIRTUAL SEMINAR) READ ABSTRACT |

Computer Weekly 6 December 2011: Read this week’s issue of the UK’s leading technology publication, featuring news on open data, cyber security and our social media awards by ComputerWeekly.com

December 02, 2011 - (Free Research)
In this week's Computer Weekly, we examine the economic benefits of plans to release more government data for wider re-use by software developers. We announce the winners of our Social Media Awards, and hear what the IT industry thinks of the new UK cyber security strategy. Download the new issue now. 
(EZINE)

Virtual Criminology Report 2009 -- Virtually Here: The Age of Cyber Warfare by McAfee, Inc.

December 07, 2009 - (Free Research)
Is the “Age of Cyber War” at hand? Since our 2007 report, there have been increasing reports of cyber attacks and network infiltrations that appear to be linked to nation-states and political goals. We decided it was time to further examine whether cyber warfare is now a part of human conflict that we should get used to seeing more often. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: WWW - World Wide Weaponization by ESET

November 10, 2009 - (Free Research)
The growth of the internet brought about massively scalable distributed systems which have proved advantageous not only for governments, businesses and end-users, but also for criminals. In this webcast, review past, present, and future considerations regarding cybercrime, and discover next-generation methods of combating weaponized software. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

WWW - World Wide Weaponization by ESET

October 22, 2009 - (Free Research)
The growth of the internet has brought about massively scalable distributed systems which have proved advantageous not only for governments, businesses and end-users, but also for criminals. In this webcast, review past, present, and future considerations regarding cybercrime, and discover next-generation methods of combating weaponized software. 
(WEBCAST) READ ABSTRACT |

Advanced cyber-security intelligence by ComputerWeekly.com

July 05, 2012 - (Free Research)
Analysts Bob Tarzey and Clive Longbottom look at the business case for rolling out next security information and event management tools. 
(ANALYST REPORT) READ ABSTRACT |

Modern Cyber Threats and Government Agencies by M86 Security

November 18, 2011 - (Free Research)
View this paper to explore how and why targeted attacks work, modern cyber attacks in the real world, the rise in public sector attacks, Web and email security solutions and more. 
(WHITE PAPER) READ ABSTRACT |

Seven Practical Steps for Federal Cyber Security and FISMA Compliance by Tripwire, Inc.

April 27, 2009 - (Free Research)
This paper provides seven practical steps any information security organization can take to improve information system security and achieve compliance with relevant regulations, standards and internal security and operational policy. 
(WHITE PAPER) READ ABSTRACT |

World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks by FireEye

December 31, 2013 - (Free Research)
This guide explores the unique characteristics of cyber-attack campaigns waged by governments worldwide. 
(WHITE PAPER) READ ABSTRACT |

First Annual Cost of Cyber Crime Study by ArcSight, an HP Company

February 07, 2011 - (Free Research)
Despite widespread awareness of the impact of cybercrime, cyber attacks continue to occur frequently and result in serious financial consequences for businesses and government institutions. 
(WHITE PAPER) READ ABSTRACT |

First Annual Cost of Cyber Crime Study: Benchmark Study of U.S. Companies by ArcSight, an HP Company

August 02, 2010 - (Free Research)
The purpose of this benchmark study is twofold. First, we wanted to quantify the economic impact of a cyber attack. Second, we believed a better understanding of the cost of cyber crime will assist organizations in determining the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 13 November 2012: Government commits to open standards by ComputerWeekly.com

November 13, 2012 - (Free Research)
In this week's Computer Weekly, we look at the government's controversial new policy on open standards and what it means for public sector IT. After hurricane Sandy hit New York, we talk to one datacentre operator about how it kept services running. And our latest buyers' guide examines the market for infrastructure on demand. Read the issue now. 
(EZINE) READ ABSTRACT |

Open Trusted Technology Provider Standard (O-TTPS) by ComputerWeekly.com

April 10, 2013 - (Free Research)
This standard is aimed at enhancing the integrity of commercial off the shelf ICT products and helping customers to manage sourcing risk. 
(WHITE PAPER) READ ABSTRACT |

What Businesses Need to Know About Cyber Security by Lumension

April 17, 2014 - (Free Research)
Access this resource and witness 4 security experts discuss today's threat landscape and how cyber security is being dealt with across the world. 
(WEBCAST) READ ABSTRACT |

Operation "Ke3chang": Targeted Attacks Against Ministries of Foreign Affairs by FireEye

December 31, 2013 - (Free Research)
This guide explores a specific cyber-espionage campaign, how it used advanced persistent threats to infiltrate systems and what you can do to prevent similar attacks. 
(WHITE PAPER) READ ABSTRACT |

Advanced Attacks Require Federal Agencies to Reimagine IT Security by FireEye

February 27, 2014 - (Free Research)
This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 1 May 2012: The technology behind the England football team by ComputerWeekly.com

May 01, 2012 - (Free Research)
This week's Computer Weekly examines how the Football Association's IT director is using technology to help improve the prospects for the England national team. Our Buyer's Guide to government IT looks at the future of open source in the public sector and we report from Infosec 2012 on the rising number of cyber attacks. Read the issue now. 
(EZINE)

How Data Centers are Becoming Unwitting Accomplices in Advanced Cyber Attacks by FireEye

December 31, 2013 - (Free Research)
This white paper explores the widening gap between the offensive capabilities of today's cyber attackers and the weak traditional defenses deployed in most data centers. 
(WHITE PAPER) READ ABSTRACT |

Definitive Guide to Next Generation Threat Protection eBook by FireEye

December 31, 2013 - (Free Research)
In today's evolving threat landscape, businesses of various sectors and sizes have fallen victim to sophisticated cyber-attacks. This in-depth eBook explores the next generation of threat protection and delves deep into various topics, such as advanced persistent threats. 
(EBOOK) READ ABSTRACT |

Targeted Cyber Attacks by GFI Software

March 18, 2008 - (Free Research)
Cyber attack is the name given by (usually sensationalist) articles and documents describing crimes that occur in a virtual world as opposed to tangible attacks such as war. 
(WHITE PAPER) READ ABSTRACT |

A More Secure Front Door: SSO and Strong Authentication by Imprivata

February 10, 2011 - (Free Research)
Times change. Sometimes they change even faster than we might expect, as recent developments in Strong Authentication have shown. Just a few years ago, the idea of requiring users to provide a second form of identity to gain access to IT resources was seen by many as only necessary for remote access security or top-secret jobs. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 474 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts