X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 cybersecurity czar


New DoD Regulations for the Cybersecurity Age: Implementing and Paying for the DFARS UCTI Safeguarding Contract Clause
The Department of Defense (DoD)’s acquisition clause on safeguarding unclassified controlled technical information (UCTI) affects DoD contractors of all sizes

cybersecurity czar  DoD Regulations for the Cybersecurity Age: Implementing and Paying for the DFARS UCTI Safeguarding Contract Clause The Department of Defense (DoD)’s acquisition clause on safeguarding unclassified controlled technical information (UCTI) affects DoD contractors of all sizes. Failure to comply with the requirements or to report a cyber incident now constitutes a breach and could result in fines or contract termination. Aronson’s white paper addresses many of the issues surrounding the new clause,

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » cybersecurity czar

The ERP Life Cycle: From Birth to Death and Birth Again


The enterprise life cycle is often misunderstood, which can lead to complications during the selection, implementation, and maintenance phases. Knowing what to expect during each phase will allow an enterprise to get better money for value from the solution.

cybersecurity czar   Read More

Measuring the Supply Chain Outside Your Enterprise


Since supply chains, by definition, are about the end-to-end inter-enterprise process, we highlight the growing importance of looking outside your four walls when thinking about supply chain performance management. If you are overwhelmed by the number of supply chain measures you are tracking, it’s better to focus your energies on a few that can have a significant impact.

cybersecurity czar   Read More

Cybersecurity Review: Background, Threatscape, Best Practices, and Resources


Technological innovation has consistently leap-frogged security innovation primarily because security was not part of the initial design of the Internet. As Internet usage matures, the advances in cybersecurity continue to move forward. Read this white paper to learn about various types of threats and best practices for protecting your data.

cybersecurity czar   Read More

Fighting Cybercrime on the Internet


Excerpts from a presentation on cybercrime by Laura Taylor, TEC Director of Security Research for the E-Gov 2000 Conference sponsored by SAIC on July 10, 2000 at the Washington Convention Center.

cybersecurity czar   Read More

Measuring the Supply Chain Outside Your Enterprise


Since supply chains, by definition, are about the end-to-end inter-enterprise process, we highlight the growing importance of looking outside your four walls when thinking about supply chain performance management. If you are overwhelmed by the number of supply chain measures you are tracking, it’s better to focus your energies on a few that can have a significant impact.

cybersecurity czar   Read More