DISA Reports

World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER: This guide explores the unique characteristics of cyber-attack campaigns waged by governments worldwide.
Posted: 05 Mar 2014 | Published: 31 Dec 2013

FireEye

Smartphones: A Savvy Strategy for Government Employees
sponsored by BlackBerry
WHITE PAPER: There is no reason why government agencies shouldn’t take advantage of all that smartphones have to offer. Employed efficiently, smartphones can address several organizational imperatives, including cost savings, greater mobility, increased telework options and sensitivity to environmental concerns. Continue reading to learn more.
Posted: 12 Jan 2011 | Published: 11 Jan 2011

BlackBerry

Guard Data In Government Environments by Implementing Continuous Diagnostics and Mitigation
sponsored by IBM
WHITE PAPER: This resource features a cost-effective automated diagnostics and mitigation security solution that offers continuous protection and is easily integrated with existing systems.
Posted: 09 May 2014 | Published: 31 Dec 2013

IBM

Social Media in Government: 5 Key Considerations
sponsored by Hootsuite
WHITE PAPER: Government agencies have begun to follow private-sector companies in leveraging social media, but may still have questions regarding the tools, processes, and organizational changes required to make social media work. This informative resource details the five top considerations for government agencies looking to deploy social media strategies.
Posted: 15 Apr 2014 | Published: 15 Apr 2014

Hootsuite

Smart City as a Service: Using Analytics to Equip Communities for Data Driven Decisions
sponsored by IBM
WHITE PAPER: This white paper how to enable municipal IT managers to build a flexible cloud foundation and support a smart city service strategy. Read on to discover how to deploy on a secure hybrid cloud model to accommodate all workloads.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

IBM

Deploy Real-time Operational Detection and Prevention to Combat Various Threats and Fraud.
sponsored by IBM Software Group
WHITE PAPER: When you understand people and their names in context and in real time, you have an increased capability to preempt threats and fraud. Find out what you can do to help protect your business.
Posted: 13 Mar 2008 | Published: 01 Jan 2007

IBM Software Group

Cloud Computing by Government Agencies: Meeting Business and Security Challenges in the Cloud
sponsored by IBM
TECHNICAL ARTICLE: This article briefly describes the procurement challenges and then jumps into advising government cloud service purchasers on the positives and negatives of security in the cloud, and how to manage their potential vendors' security risks. Read on to learn more.
Posted: 13 Sep 2010 | Published: 17 Aug 2010

IBM

Transcript: The Changing Role of the CIO
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

Hewlett Packard Enterprise

How to Prevent Security Breaches Through Effective Management and Control of USB Devices
sponsored by Lumension
WEBCAST: Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity.
Posted: 12 Aug 2009 | Premiered: Aug 12, 2009

Lumension

Cloud Computing: Get to know the basics
sponsored by Red Hat
WHITE PAPER: This white paper explains how government IT can enjoy cloud capabilities while keeping existing IT investments and avoiding vendor lock-in. Explore how open source and application portability in the cloud and the relationships between technology providers are critical to building a successful cloud strategy.
Posted: 23 Jan 2012 | Published: 05 Jan 2012

Red Hat