• Undermining Hackers' New Tricks

    In this GCN article, Tony D'Angelo, Vice President of Federal at Proofpoint, details how agencies must keep their strategies fluid as threat actors target users in new mediums.


    • Cybersecurity , Proofpoint
  • Become a Service-Aware Enterprise

    In this GCN article, Bob Osborn, Chief Technology Officer for Federal at Servicenow, discusses how understanding complex and changing boundaries reduces risk and increases security awareness.


    • ServiceNow, Cybersecurity
  • Win Cyber Battles

    In this GCN article, Tony Cole, Vice President and Global Government CTO at FireEye, discusses how an intelligence-led strategy shifts the focus from regulatory compliance to risk mitigation.


    • FireEye, Cybersecurity
  • Rethink the Perimeter

    In this GCN article, Chris Townsend, Vice President of Federal at Symantec, discusses how agencies need to shift their focus from securing boundaries to protecting critical data.


    • Symantec, Cybersecurity
  • How the Cyber Field is Evolving

    In this GCN article, Rick Howard, Chief Security Officer at Palo Alto Networks, outlines the new approaches that are streamlining security and targeting the next generation of cyber professionals.


    • Palo Alto Networks, Cybersecurity
  • Innovation Fuels Cyber Advances

    Read this GCN article to learn how new technologies and strategies are providing government agencies with new ways to defend their networks.


    • All, Cybersecurity
  • Proofpoint DoubleBlind Key Architecture Solution Brief

    This solution brief provides an overview of Proofpoint's DoubleBlind Key Architecture and its benefits to enterprise security through its unique encryption approach.


    • Cybersecurity , Proofpoint
  • Best Practices for Dealing with Phishing and Ransomware Whitepaper

    This whitepaper details the best practices for dealing with phishing and ransomware, in addition to the key takeaways from industry research on prevalent cyberattacks.


    • Cybersecurity , Proofpoint
  • Splunk for Compliance

    This solution guide describes how you can meet compliance requirements by monitoring, alerting and reporting on machine data.


    • Splunk, Cybersecurity
  • Splunk for Risk Management Framework

    This tech brief outlines the six steps of the risk management framework.


    • Splunk, Cybersecurity
  • ServiceNow Incident Management Datasheet

    This report outlines the current IT challenges, and the ServiceNow Solution


    • ServiceNow, Cybersecurity
  • ServiceNow Security Operations Datasheet

    This whitepaper details the benefits of ServiceNow Security Operations and how it helps organizations drive a faster, more efficient security response.


    • ServiceNow, Cybersecurity
  • Rethinking Federal Cybersecurity for the Cloud Generation Whitepaper

    This whitepaper outlines the new proven approach for cloud security - using a unified, network-based platform with a flexible security architecture that can manage the ever-changing cloud environment – from the endpoint through the data transmission pipe to the cloud and back.​


    • Symantec, Cybersecurity
  • Internet Security Threat Report for Government

    This report outlines the public sector internet security trends for April 2017.


    • Symantec, Cybersecurity
  • From Prevention to Remediation Infographic

    This infographic lays out the threats that the next generation of endpoint protection platforms need to be able to comabt.


    • FireEye, Cybersecurity