30 Federal IT Influencers Worth a Follow in 2023 Nov 13 2023 These experts can provide insight and knowledge about the cyber topics that most concern the federal government.
In This Issue: Focus on Network Security HEALTHY IT: Isolating Medical Devices > SIEM TOOLS: Analyze and Prioritize > UTM: Tips for Small-Scale Deployment > IDS: Spotting Security Problems > September 7, 2010 e-mail sign up Online Help Today for Tomorrowís Technology Challenges Case Study Quarantining Infection VA finds cure for infected medical devices After computerized medical devices at the Department of Veterans Affairs contracted viruses and malware, the agency moved to isolate some 50,000 of them from the network using virtual LANs and access control lists. READ STORY > SHARE > Tech Trends Security Smarts Management systems make sense of alerts Tracking all the security events that occur on a large network can be near impossible for IT staff, so the Navy and the Federal Aviation Administration tap security information event management tools to analyze events and respond. READ STORY > SHARE > Tech Tips SSL VPN Virtuoso Try these four tips for deployment Unified threat management devices offer SSL VPNs with a lower price tag and easier management than their enterprise-class brethren. Here are four suggestions for using small-scale SSL VPNs more effectively. READ STORY > SHARE > Tech Tips Intrusion Detection Systems Learn how to best apply an IDS to spot security problems Learn how to best apply an IDS in your agency to detect security policy violations, data leakage, and misconfigured or unauthorized devices. READ STORY > SHARE > Best Practices Data Loss Prevention Ensure sensitive digital assets remain in your organization Data loss prevention products offer valuable aid in detecting leakage of Social Security or credit card numbers. To get the most from these tools, apply proper policies and risk assessment. READ STORY > SHARE > White Paper Security: Key strategies for safeguarding IT resources from interior and exterior threats. Reference Guide Security: Keeping information confidential, intact and accessible when threats emerge. Community View the 21st Century Government Share FedTech E-Newsletter on: Visit: This e-mail is intended for the purposes of researching or purchasing products offered for sale by CDW·G. All information is subject to CDW·G's terms, conditions and policies. Copyright © 2010 CDW Government LLC, 230 North Milwaukee Avenue, Vernon Hills, IL 60061; 800.808.4239