The Guide to Cyber Threat Information Sharing is designed to help agencies leverage collective knowledge and experience by actively sharing threat intelligence and ongoing coordination.
Government IT managers will soon have more options for Office 356 data loss protection and mobile device controls.
The USDA is working to improve tools and tactics for anti-fraud detection, despite reports that error rates are dropping fast.
Docs@Work lets users access, annotate and share enterprise content regardless of location, in a variety of cloud repositories, while providing IT a centralized way to secure and manage mobile content and device policies.
The National Institute of Standards and Technology released its Cloud Computing Technology Roadmap, a set objectives for the accelerated adoption of cloud computing in government.
The company’s Continuous Assurance Platform automates collection and analysis of compliance artifacts and controls, ensuring against a failed audit or fines.
Integra introduced its DDoS Mitigation Service, which monitors network traffic to mitigate threats at the network edge, away from customers’ premises.
Government IT managers can help protect their agencies, its devices and the critical infrastructure by ensuring security is baked into connected systems.
The move is designed to increase the security of financial transactions by requiring the use of microchip-enabled credit, debit and other payment cards by agencies.
States are turning to inventory management tools to help provide the data they need to tax, regulate and finance new retail marijuana businesses.
By applying gaming elements to its websites, Hawaii has boosted citizens’ use of online services by as much as 20 percent.
GoldDisk Plus reduces the cost and effort of starting and maintaining compliant systems in the Amazon cloud environment.