Government regulations and policies, coupled with elevated levels of domestic and foreign security, have increased the urgency for government agencies to fully understand and proactively manage their complete portfolio of assets. Read this brochure and find out how IBM® Maximo Asset Management helps government...
The use of analytics in government can be either tactical or strategic-supporting or even driving the accomplishment of key missions and objectives.
Read the white paper, "Strategic Use of Analytics in Government" and find out how four governmental mission and management areas make use of analytics.
Data centers are part of an ever changing world with challenges of high energy consumption, labor costs, data silos and growth in data volume. Learn how to meet these challenges with IBM's cohesive strategy for the development of a dynamic infrastructure, while also laying the foundation for a highly responsive...
Many threats to the confidentiality, integrity and availability of critical data on federal government networks can be traced to a lack of compliance. Read this white paper and find out how IBM's expertise can help you build a robust IT security solution governance program that detects, protects and manages...
A new Federal Trade Commission privacy report endorses implementation of a "do not track" mechanism so consumers can choose whether to allow the collection of data regarding their online searching and browsing activities.
When financial institutions and businesses store Social Security numbers in databases, they run the risk of exposing their customers to insider threats.
Four consumer advocacy organizations have filed a complaint with the Federal Trade Commission, calling for it to crack down on what it portrays as unfair and deceptive Internet-based healthcare marketing and advertising practices that threaten consumer privacy.
Federal regulators have published a final rule carrying out the Genetic Information Nondiscrimination Act, which prohibits the use of genetic information to make decisions about health insurance and employment.
The new Congress likely won't cut EHR incentive funding, but it will keep a close eye on emerging HITECH Act privacy and security regulations, observers say.
A Colorado court's decision to overturn an identity-theft conviction based on the misuse of a stolen Social Security number has stirred debate among identity theft protection advocates.
Indiana Attorney General Greg Zoeller has sued health insurer WellPoint Inc., alleging the firm took too long to notify Indiana residents affected by a health information breach.
"There is no scary part in the process when it's all well thought out and planned," says George Tumas, SVP and CIO of internet services development at Wells Fargo.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.