June 27, 2014Underwritten by Red Hat A new understanding of network security based on software defined perimeters could fundamentally alter the cloud security narrative and present an opportunity for federal agencies to make the most of cloud computing.
June 24, 2014Underwritten by Polycom By shifting from a device-centric to a user-centric model of communications, government organizations can better meet user needs and increase overall productivity.
June 19, 2014Underwritten by Dell Software As cyber threats become more prevalent and sophisticated, agencies face immense pressure to improve cyber defenses. But what is the current state of federal cybersecurity, and what cyber defense elements need the most improvement?
June 19, 2014Underwritten by Dell Software Despite continued, widespread concern for federal cybersecurity, the current state of agency cyber defenses has been difficult to ascertain. New primary research provides greater insight and underscores the importance of personnel management and awareness.
June 19, 2014Underwritten by Samsung To fully realize the benefits of mobile technology, federal agencies require mobile security solutions that are both flexible and scalable enough to meet the diverse needs of the federal workforce and tough enough to safeguard government communications against a wide array of modern threats.
June 18, 2014 Is your agency sacrificing mobility for the sake of security?
June 18, 2014Underwritten by Samsung Technological, cultural, and budgetary hurdles are straining the goal of a digital and mobile federal workforce. What is your agency doing to meet the challenge?