Search
Now showing results 1-10 of 73
2022 Deloitte-NASCIO Cybersecurity Study
(2022-10-12)
This is the 7thbiennial study from Deloitte and NASCIO and captures responses from CISOs in all 50 states and three territories about current cybersecurity trends, challenges and opportunities. The survey found that state ...
A Taxonomy of Digital Threats
(2020-04-24)
This virtual session convened subject matter experts to discuss digital threats and the wider cybersecurity ecosystem. The focus is on the four primary categories of digital threats (financial fraud, attacks on reputation, ...
Simplifying Cybersecurity Strategies to Address Modern Threats
(2022-09)
This report suggests that a single, unified cybersecurity platform can help organizations achieve their goals by improving visibility; enabling intelligent automation of detection, prevention and response tasks; and reducing ...
Is Your Government Organization Cyber Resilient?
(2022-08-07)
Internationally recognized cybersecurity leader, Dan Lohrmann, discusses what it means to be prepared for technology and business disruptions in the 2020s, and how your organization can quickly recover.
Getting to Zero Trust: A Practical Guide for State and Local Governments
(2022-06)
This guide was developed to help state and local governments begin their journey to Zero Trust by outlining actionable strategies for transitioning to this emerging security framework and architecture. The six key security ...
3 Steps to Stop Employees Taking Cyber Bait
(2021-12)
This eBook enables IT leaders to address challenges to building a defensible security awareness program; capture the facts on ransomware; develop a defensible awareness program; and see the data showing cybersecurity is a ...
Two-Factor Authentication: A Primer for Today's IT Professional
(2021-09-24)
This article provides a detailed explanation of Two-Factor Authentication (also referred to as (2 FA) including what it is, why it is so helpful, and how to set it up.
Two Top Areas to Mitigate Government's Cyber Woes: Part One
(2021-09-27)
Remote work and underinvestment have created a public-sector security environment ripe for exploitation - the government must respond. In the first part of a two-part series, Oracle leaders talk about the human element.
NIST Digital Identity Guidelines
(2020-03-02)
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. The guidelines cover ...
Experts Talk Future of Cybersecurity, Near-Term Challenges
(2021-06-04)
Cybersecurity leaders debated choosing the right security framework, using AI to get ahead of threats and making developers the stars of cloud-based defenses during a recent panel discussion.