Search
Now showing results 1-10 of 10
Experts Talk Future of Cybersecurity, Near-Term Challenges
(2021-06-04)
Cybersecurity leaders debated choosing the right security framework, using AI to get ahead of threats and making developers the stars of cloud-based defenses during a recent panel discussion.
Remote Work and Disposable Tech may put Government Data at Risk
(2021-01-04)
The concept of bring your own device (BYOD), while convenient, has limited agency control, making concerns about unauthorized access to government systems and data a growing priority.
Fortifying Your Cloud: Mitigation Techniques for Cloud Security Flaws
(2021-01-20)
The cloud has opened up massive possibilities for businesses. The ability to scale quickly without growing on-premise equipment has been a game changer in recent years. But innovation gives rise to more sophisticated ...
How to Fast-Track Trust in the Public Sector
(2021-04-27)
In this article, the author outlines why public trust in government technology systems as fallen, and what can be done to help build trust.
5 Questions to Ask Yourself About Cloud Security
(2021-03-02)
With improved security,digital transformationis achievable and cloud flexibility and scalability can grow. According toOracle experts, the following arefive attributesthat your agencys cloud security should include: ...
NASCIO Voices: StateRAMP Questions Answered with Leah McGrath
(2021-03-10)
StateRAMP executive director, Leah McGrath talks all about this new program to verify the cybersecurity of cloud service providers for state and local governments. Leah discusses the timeline, how it works and how StateRAMP ...
Two Top Areas to Mitigate Government's Cyber Woes: Part One
(2021-09-27)
Remote work and underinvestment have created a public-sector security environment ripe for exploitation - the government must respond. In the first part of a two-part series, Oracle leaders talk about the human element.
Two-Factor Authentication: A Primer for Today's IT Professional
(2021-09-24)
This article provides a detailed explanation of Two-Factor Authentication (also referred to as (2 FA) including what it is, why it is so helpful, and how to set it up.
3 Steps to Stop Employees Taking Cyber Bait
(2021-12)
This eBook enables IT leaders to address challenges to building a defensible security awareness program; capture the facts on ransomware; develop a defensible awareness program; and see the data showing cybersecurity is a ...
Spotlight on Technology
(2021-11-09)
This report highlights results from a survey of IT decision makers on the importance of, and obstacles to technology innovation. (Note: Access to content may require you to provide an email address or other contact information)