• Using cyber threat intelligence at the operational, tactical levels

    Tom Topping, Senior Director of Strategic Programs for FireEye, talks to Jason Miller, Executive Editor at Federal News Radio, about why agencies need to understand their risks and use cyber threat intelligence to better mitigate them.


    • FireEye, Cybersecurity
  • Connect the Cyber Dots

    Tom Topping, the Senior Director of Strategic Programs for FireEye, explains an important reason why agencies should do more to connect the cyber dots.


    • FireEye, Cybersecurity
  • Four Criteria for Good Cyber Threat Intelligence

    Tom Topping, the Senior Director of Strategic Programs for FireEye, explains what goes into good cyber threat intelligence.


    • FireEye, Cybersecurity
  • Viewtrust Risk Management and Continuous Compliance Monitoring Data Sheet

    This data sheet discusses how organizations can gain a near real-time view of their entire compliance posture.


    • Virtustream, Cybersecurity
  • Agency leaders should turn to a digital risk management approach

    Dan Carayiannis, the Director of Public Sector at RSA, talks to Jason Miller, Executive Editor at Federal News Radio, about an emerging concept across both the public and private sectors where organizations are focusing on digital risk management


    • RSA, Cybersecurity
  • Are Agencies Considering Everything?

    Dan Carayiannis, the Director of Public Sector at RSA, says agencies have more to consider when it comes to protecting their networks and data as they transform.


    • RSA, Cybersecurity
  • Understanding the Growing Number of Risk Factors is Key

    Dan Carayiannis, the Director of Public Sector at RSA, says understanding the growing number of risk factors is key to managing the transformation effort.


    • RSA, Cybersecurity
  • Risk Management is No Longer a Static Measure

    Dan Carayiannis, the Director of Public Sector at RSA, says risk management is no longer a static measure.


    • RSA, Cybersecurity
  • Serving Customers in Spite of Hackers’ Continued Aggression

    Dan Carayiannis, the Director of Public Sector at RSA, says agencies need to figure out how to continue to serve their customers in spite of hackers’ continued aggression.


    • RSA, Cybersecurity
  • Protecting Government Data White Paper

    This white paper from Trustwave Government Solutions discusses how the company's clients use database security solutions, including Trustwave AppDetectivePro and Trustwave DbProtect, and managed database security testing services to protect data around the world.


    • Cybersecurity , Trustwave
  • M-Trends 2018 Report

    This report from Mandiant, a FireEye company, details the latest trends in cybersecurity observed over the last year, including the widening cybersecurity skills gap and the increasing sophistication of threat actors.


    • FireEye, Cybersecurity
  • Addressing Continuous Diagnostics and Mitigation Requirements Whitepaper

    This paper offers a detailed look at many of the CDM requirements that pertain to securing sensitive government data and reveals how the Vormetric Data Security Platform can help agencies achieve or exceed many of the functional tool area requirements within CDM.


    • Thales E-Security, Cybersecurity
  • ForeScout Government Solution Brief

    This solution brief overviews how ForeScout Technologies helps government IT professionals protect confidential data, demonstrate compliance with regulations and provide secure network access for a wide range of devices and user populations in a cost-effective, efficient and non-disruptive manner.


    • Cybersecurity , ForeScout
  • GCN Report: Modernizing Cybersecurity

    Learn more about how you can better adapt to a changing threat landscape with integrated tools that build the larger picture of threat intelligence and orchestrate responses from one platform.


    • All, Cybersecurity
  • Adapting to a Changing Threat Landscape

    Learn more about why agencies need flexible yet targeted strategies to address the fluid nature of cyberattacks in this GCN article.


    • All, Cybersecurity