cybersecurity
 

Topic Resources

  • Security in the Cloud: Moving Beyond Compliance

    Creating a fully compliant cloud-based system is hard enough, but even that doesn’t go far enough to ensure security. As federal agencies are migrating to the cloud, some are learning best methods for creating a cloud-based security model they can trust...

  • Case Study: City of Fayetteville

    What if you could find out what animals needed attention at the animal shelter, which sporting equipment was used most frequently in the city gym, which parking garage spaces were available most often, and when traffic was the busiest around city hall — all in a matter of minutes, from anywhere? Although this may sound futuristic, government organizations, like the city of Fayetteville, are already using technology to solve for these questions, and much more.

  • PixelNet 2.0: The Pixel Perfect Platform

    On a large corporate campus for a major hardware manufacturer, the ability to display and manage audiovisual data is paramount. From real-time operations room video and security camera footage, to lobby signage, to streaming data and other A/V applications in conference rooms across multiple buildings, critical operations rely on accurate, real-time video data.

  • Accelerate and Maintain NIST 800-171 Compliance

    The Department of Defense (DoD) requires all contractors that process, store or transmit Controlled Unclassified Information (CUI) to have met the Defense Federal Acquisition Regulation Supplement (DFARS) minimum security standards by December 31, 2017 or risk losing their DoD contracts.3

  • Easing the Burden of Compliance

    Achieving and maintaining compliance continues to be a top priority for state and local governments. This is especially true when it comes to cybersecurity-related mandates. The processes for ensuring compliance remain a significant challenge because of new and evolving regulations and requirements. Agencies also struggle with reduced staff and budgets to ensure compliance. This eBook examines the current compliance landscape and how technologies like data encryption can help.

inside gcn

  • robot typing on laptop (Zapp2Photo/Shutterstock.com)

    GSA to agencies: Tap MGT for emerging tech


More from 1105 Public Sector Media Group