cybersecurity
 

Topic Resources

  • Advanced Threats and Big Data: The New Cybersecurity Landscape

    So often in our organizations, information silos keep us from sharing data and communicating the right information at the right time to stop advanced threats. Hear why a big data solution is an important part of a defense against advanced threats and ideas about what data sources are required across the organization for this analysis to combat these attacks.

  • Video Surveillance: Emerging Solutions for Securing Agency Assets

    Please note that this webcast, originally scheduled for 10/16, from 2:00-3:00pm ET, has been rescheduled to 12/10, from 2:00-3:00pm ET. Thank you for your patience and understanding.

    The Boston Marathon bombings in April 2013 put a spotlight on the stunning advances made in video surveillance and forensics technology and its use in law enforcement and security. The latest generation of video analytic tools and techniques makes it possible to extract valuable information with unprecedented speed and precision. In this webcast, Grant Fredericks, a pioneer in forensic video analysis applications, will provide expert insight into the world of video surveillance and forensics technology.

  • The STAND: Cybersecurity

    Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned about the ongoing evolution of the cyber landscape, it just means they are not paying enough attention. The problem is that these and other emerging cyber tactics are designed to evade traditional cyber defenses and escape detection until it’s too late. The good news is it’s not a lost cause. In this special report, two subject matter experts discuss cybersecurity technologies and strategies that can help agencies defend their systems and data against the latest cyber threats, today and into the future.

  • Establishing a Logical Perimeter: The Evolution of Network Security

    This whitepaper highlights the challenges you face when users are off network, and strategies to address the compliance and protection issues posed by remote network users.