Defense Communications Agency White Papers

(View All Report Types)
Deploy Real-time Operational Detection and Prevention to Combat Various Threats and Fraud.
sponsored by IBM Software Group
WHITE PAPER: When you understand people and their names in context and in real time, you have an increased capability to preempt threats and fraud. Find out what you can do to help protect your business.
Posted: 13 Mar 2008 | Published: 01 Jan 2007

IBM Software Group

Critical Technologies for Compliance and Risk Management
sponsored by Siperian, Inc.
WHITE PAPER: Due to the financial meltdown in the mortgage-backed securities industry, new compliance requirements will be implemented. Read this paper to find out how organizations can ensure compliance with stricter regulations and manage risk appropriately so the business does not slip into non-compliance resulting in negative publicity or punitive fines.
Posted: 20 Feb 2009 | Published: 20 Feb 2009

Siperian, Inc.

Into the Future: The Fast Track for Financial Markets
sponsored by IBM Line of Business
WHITE PAPER: This paper explores how high performance computing solutions from IBM can enable high-velocity financial analytics and trading.
Posted: 17 Jun 2008 | Published: 01 Sep 2007

IBM Line of Business

The Future Of Defense
sponsored by Keeper Security Inc
INFOGRAPHIC: To find out how evolving cyberthreats are impacting organizations, Keeper Security commissioned an independent research agency to survey more than 800 leaders. Dig into this infographic to unlock key findings about which attack vectors IT leaders feel unprepared to face, how often security teams navigate waves of attacks, and more.
Posted: 06 Sep 2024 | Published: 06 Sep 2024

Keeper Security Inc

Five Ways to Improve Cybersecurity at Your Government Agency
sponsored by Hughes Network Systems
BLOG: Government agencies, regardless of their mission or size, hold onto a significant amount of data. Some of this data is highly confidential when you consider it includes the DMV, the IRS and more. Because of the nature of the data they collect, cybersecurity is always top of mind. Read on to learn cybersecurity tips that any agency can benefit from.
Posted: 03 Dec 2024 | Published: 22 Jun 2023

TOPICS:  .NET
Hughes Network Systems

Five Ways to Improve Cybersecurity at Your Government Agency
sponsored by Hughes Network Systems
BLOG: Government agencies, regardless of their mission or size, hold onto a significant amount of data. Some of this data is highly confidential when you consider it includes the DMV, the IRS and more. Because of the nature of the data they collect, cybersecurity is always top of mind. Read on to learn cybersecurity tips that any agency can benefit from.
Posted: 22 Jun 2023 | Published: 22 Jun 2023

TOPICS:  .NET
Hughes Network Systems

Defending A Defense Contractor With A Compliant Unified Communications Solution
sponsored by ARG, Inc.
CASE STUDY: A national, privately held defense contractor had previously leveraged Avaya on-prem PBX, Verizon PRIs and numerous collaboration and messaging tools (Teams, Slack, etc.) As many of these were disjointed, compliance risks arose. View this case study to learn how ARG helped this contractor aggregate tools and eliminate overlap.
Posted: 30 Jul 2021 | Published: 30 Jul 2021

TOPICS:  .NET
All resources sponsored by ARG, Inc.

Put AI To Work For Human Capital And Talent Transformation For Government Agencies
sponsored by IBM
EBOOK: Human capital leaders in government are leveraging AI to enhance HR and talent transformation, focusing on enhancing government human capital processes, improving employee experience, and driving outcomes in skills development, employee communications, and process management. Read on now to learn more.
Posted: 13 Nov 2024 | Published: 13 Nov 2024

IBM

AI For Cyber Defense
sponsored by CyberMaxx
EBOOK: For a deep dive on the relationship between AI and cyber defense, check out this 14-page e-book by SVP of Security Operations at CyberMaxx, Gary Monti.
Posted: 20 Sep 2024 | Published: 23 Sep 2024

CyberMaxx

CW ANZ, November 2018: Exploring blockchain
sponsored by TechTarget ComputerWeekly.com
EZINE: Blockchain technology has been in the news due to its ability to provide much better security, transparency and efficiency. In this issue of CW ANZ, we look at how enterprises in Australia and New Zealand are using blockchain technology to improve security and efficiency, and what it takes to spur greater adoption among ANZ enterprises.
Posted: 08 Feb 2021 | Published: 07 Nov 2018

TechTarget ComputerWeekly.com

Build Your Agency’s Next Breakthrough
sponsored by FCN
WHITE PAPER: Tap into this white paper to discover how you can balance business agility and dependable security with help from a partner.
Posted: 18 Jul 2023 | Published: 18 Jul 2023

TOPICS:  .NET
FCN

A Network Defense Layer That Actually Works
sponsored by Centripetal Networks
PRODUCT OVERVIEW: As cyber threats evolve, traditional firewalls alone are no longer sufficient. Centripetal's CleanINTERNET adds a critical external defense layer, leveraging advanced threat intelligence to detect and block threats in real-time. Download this blog to learn how a multi-layered security approach can enhance your enterprise's defense.
Posted: 13 Sep 2024 | Published: 14 Sep 2024

Centripetal Networks

CW ANZ: Australian firms connect people in new ways
sponsored by TechTarget ComputerWeekly.com
EZINE: Australian organisations such as BPay are turning to unified communications (UC) to create workplaces where employees operate in a flexible and open work environment. In this issue of CW ANZ, we look at how companies are approaching UC, the state of the market and what organisations need to do to be successful in rolling out UC tools.
Posted: 08 Feb 2021 | Published: 11 May 2018

TechTarget ComputerWeekly.com

Fedramp-Compliant Unified Communications Solution Delivers Simplicity, Scalability, And Savings
sponsored by ARG, Inc.
CASE STUDY: A top 10 federal defense contractor with over 20,000 employees was managing a complex environment with large Avaya and Cisco footprints for PBX and contact center. They required a FedRAMP environment that provided a seamless consolidation of collaboration, conferencing and voice. Download this case study to learn how they got it.
Posted: 30 Jul 2021 | Published: 30 Jul 2021

TOPICS:  .NET
All resources sponsored by ARG, Inc.

Mobile Threat Defense
sponsored by JAMF
WHITE PAPER: Despite the strength of its built in out-of-the-box security parameter, hackers are increasingly focusing on ways of leveraging attacks against Apple devices. Download this guide to learn more and unlock key strategies you can implement to defend your Apple endpoints.
Posted: 26 Feb 2024 | Published: 26 Feb 2024

TOPICS:  .NET
JAMF

Computer Weekly – 14 March 2023: Digital dedication – the transformation of Guinness World Records
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out about the digital transformation at Guinness World Records – dedication, that's what you need. We examine the new space race – to launch low-orbit, low-cost communications satellites. And we look at the role of technology in sustainability strategies. Read the issue now.
Posted: 13 Mar 2023 | Published: 14 Mar 2023

TechTarget ComputerWeekly.com

Ransomware Essentials: A Guide for Financial Services Firm Defense
sponsored by Akamai Technologies
WHITE PAPER: Ransomware attacks are increasingly targeting financial institutions, causing disruptions to operations and major financial losses. The 2024 update of FS-ISAC Ransomware Essentials provides critical insights into ransomware defense strategies, incident response plans, and crisis management. Learn how to safeguard your institution.
Posted: 20 Dec 2024 | Published: 20 Dec 2024

TOPICS:  .NET
Akamai Technologies

The myth of email as proof of communication
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT: Increasingly, there is a need for organisations to be able to prove the content of communications between themselves and other parties. Analyst group Quocirca looks at the options.
Posted: 08 Feb 2021 | Published: 02 Dec 2016

TechTarget ComputerWeekly.com

Computer Weekly – 9 June 2020: How retailers are staying connected during their coronavirus shutdown
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how the hard-hit retail sector has turned to technology to stay connected during the coronavirus lockdown. Our latest buyer's guide examines best practice in data quality. And we look at how remote working affects software development teams.
Posted: 08 Feb 2021 | Published: 09 Jun 2020

TechTarget ComputerWeekly.com

Accelerating Zero Trust Capabilities
sponsored by Saviynt
EBOOK: The rapid growth of adversarial cyber threats emphasizes the need for the Department of Defense (DoD) to adapt and improve our deterrence strategies and cybersecurity implementations. In this whitepaper, Saviynt will hone in on the three specific pillars that require agencies to protect users, systems, and data at the identity layer.
Posted: 30 Apr 2024 | Published: 30 Apr 2024

TOPICS:  .NET
Saviynt

Gamma International: The Macedonia files
sponsored by TechTarget ComputerWeekly.com
RESOURCE: This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.
Posted: 08 Feb 2021 | Published: 23 Nov 2017

TechTarget ComputerWeekly.com

Digital And Hybrid Event Platform In An ISO-Certified AWS Environment
sponsored by AllCloud
CASE STUDY: VOK DAMS, an international communications agency for events and live marketing, needed a way to create a platform for hosting hybrid events with both digital and in-person participants. Check out this brief case study to explore the benefits of working with AWS and AllCloud to build a foundation for your business innovation needs.
Posted: 27 Jan 2022 | Published: 27 Jan 2022

TOPICS:  .NET
AllCloud

The Public Sector’s Guide to Privilege
sponsored by CyberFOX
EBOOK: Cybercriminals target public institutions like schools and government agencies due to sensitive data and weak security. This e-book examines cybersecurity oversights, attack impacts, and how privileged access and password management solutions can reduce risks. Read the full e-book to learn how you can strengthen your organization's defenses.
Posted: 04 Oct 2024 | Published: 04 Oct 2024

CyberFOX

How cellular networks improve emergency response
sponsored by Ericsson
EBOOK: First responders act in situations in which a few seconds can mean the difference between life and death. Because of this, when they rely on a network to facilitate their communication, it is essential that the network be as strong and ready as they are. Read on to learn more about why first responders choose CradlePoint for their network needs.
Posted: 18 May 2022 | Published: 18 May 2022

TOPICS:  .NET
Ericsson

Protect Federal Agencies by Securing DevOps, Secrets and Other Non-human Identities
sponsored by Merlin International
WHITE PAPER: Securing non-human identities is crucial for federal agencies to prevent costly breaches and protect critical infrastructure. Learn how effective secrets management can enable secure DevSecOps and fulfill key cybersecurity directives. Read the full white paper.
Posted: 11 Oct 2024 | Published: 11 Oct 2024

Merlin International

CW ANZ: Trend Watch - communications infrastructure
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In this handbook, Computer Weekly looks at how Australia's bushfires impacted its telecoms networks and the increase in SD-WAN adoption in Asia-Pacific
Posted: 08 Feb 2021 | Published: 16 Apr 2020

TechTarget ComputerWeekly.com

Computer Weekly – 5 December 2023: Technologies to support hybrid working
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide looks at technologies to support hybrid working – even when your business is as unique as farming. Read the issue now.
Posted: 01 Dec 2023 | Published: 05 Dec 2023

TechTarget ComputerWeekly.com

Before Tackling Secure Texting In Healthcare, Change Your Company Culture
sponsored by AVST
EGUIDE: In this expert e-guide, learn why the first step to secure communications technology (like texting) is convincing leaders and clinicians to recognize the risks to health data.
Posted: 08 Feb 2021 | Published: 16 Feb 2017

AVST