Trial lock

This content requires an active subscription.

Contact one of our representatives for assistance.

Speak With A Representative
or Call: 1-888-670-8889 (US) or 1-844-618-3192 (CAN)

Benchmarking Reports

Industry-specific benchmarking reports built on years of in-depth industry data, collected using our innovative diagnostic programs. We aggregate the data across hundreds of IT departments in your industry to give you tailored vertical insights, all packaged in professional boardroom-ready reports.

Benchmarking report example
Reference Architecture Sample Slide

Government Reference Architecture

Reference architectures built on years of industry expertise, honed by analysts working with real IT professionals in your industry. Leverage industry best practices so you don’t waste time and money reinventing the wheel.

Government Notes

Short, tailored research notes aimed at providing you with timely insights, relevant to your industry. Hot off the press, these notes will be published regularly and pair great with your morning coffee.

Filter by Category:
Clear Filters
Filter by Type:
Clear Filters
Premium white logo

Hacking Voting Machines: Democracy and Elections Are at Risk

Filters:
Date published:

July 20, 2018

Author:
  • Filipe De Souza

Voting machines are just like any other machine – susceptible to cyberattacks and vulnerabilities. But how easily can this be done? And how can governments start protecting themselves?

Build Your Security Culture by Reminding Your Employees That They Are Citizens Too

Filters:
Date published:

July 20, 2018

Author:
  • Filipe De Souza

Governments are in a unique position where their employees are also their citizens – leverage this in order to build a stronger security culture.

Governments Are Handling More Sensitive Data Than Ever – How Does One Go About Classifying It All?

Filters:
Date published:

July 20, 2018

Author:
  • Filipe De Souza

Governments today, whether municipal, state, or federal, are handling a great deal of sensitive information, but do not know how to properly handle it. Should all personally identifiable information be held equal to one another? How can we distinguish between these types of data?

I Spy With My Little Eye: Cyberespionage on Critical Infrastructure

Filters:
Date published:

July 13, 2018

Author:
  • Michelle Tran

Cyberespionage on critical infrastructure has been a growing interest in the last decade. Using old tactics of spear-phishing, water-holing, and social engineering, nation-sponsored hackers have been able to collect enough information to understand business infrastructure and to potentially cause irreparable damage.

&#@%-iNg_P4ssw0rds!: Password Fatigue and Government Employees

Filters:
Date published:

July 13, 2018

Author:
  • Logan Rohde

Passwords and online accounts are now a part of life, though most of us struggle to remember unique passwords for all of our accounts – a phenomenon known as “password fatigue.” This note addresses how this struggle negatively affects cybersecurity in government organizations.