IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive 7

RSS Feed    Add to Google    Add to My Yahoo!
Homeland Security Presidential Directive 7 Reports
 
How SMBs are Changing their Security Tactics
sponsored by Booz Allen Hamilton
EGUIDE: Security has changed dramatically over the decades. In this e-guide, learn why firms look to security analytics to keep pace with cyber threats and how closer collaboration between departments, such as business continuity and information security, could help raise staff awareness.
Posted: 03 Jan 2018 | Published: 03 Jan 2018

Booz Allen Hamilton

PCI DSS Compliance: Best Practice Checklist
sponsored by Semafone
WHITE PAPER: With a multitude of systems, people, and processes within the call center, securing sensitive customer data has become increasingly challenging, and this is why the PCI DSS regulation was implemented. Explore this resource to uncover a PCI DSS checklist to gauge your compliance readiness.
Posted: 05 Jan 2018 | Published: 05 Jan 2018

Semafone

An Intelligent Response to Rising Threats
sponsored by AdvizeX Technologies
WHITE PAPER: This white paper offers an approach to enhancing your current SIEM approach to improve security and protect against ransomware and malware targeting your enterprise's data.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

AdvizeX Technologies

The ROI of AppSec: Getting your Money's Worth from your AppSec Program
sponsored by Veracode, Inc.
WEBCAST: Access this webcast to gain a better understanding of the impact of application security on the end-to-end software development value chain. Then, discover how much it really cost to fix security vulnerabilities in relation to application development.
Posted: 16 Jan 2018 | Premiered: Jan 16, 2018

Veracode, Inc.

The 5-Minute Companion for the Cyber-Conscious Employee
sponsored by Arctic Wolf Networks, Inc.
EBOOK: Recent studies have pointed fingers at employees, often referring to them as the "weakest link" in cybersecurity. However, more often than not employees haven't received the proper training. Access your 5-minute guide to cyber-consciousness.
Posted: 08 Jan 2018 | Published: 08 Jan 2018

Arctic Wolf Networks, Inc.

The State of Software Security: Developer Guide
sponsored by Veracode, Inc.
WHITE PAPER: This State of Software Security report examines the increased burden on developers to ensure sound app security testing, particularly in DevOps and Agile environments. Discover best practices to improve app security testing and remediation, and learn about the tenets of DevSecOps.
Posted: 12 Jan 2018 | Published: 31 Dec 2017

Veracode, Inc.

Aziz Bank of Afghanistan Reduces the Risk of Cyber Threats Using Seqrite Endpoint Security
sponsored by Seqrite
CASE STUDY: Many customers rely on the Azizi Bank's online portal for service requests, but low internet bandwidth was affecting the bank's operation and business behavior. Inside this case study, learn how this bank achieved security through endpoint and firewall protection to monitor and control web traffic.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Seqrite

How to Create a Scalable Threat Model
sponsored by Synopsys
WHITE PAPER: Find out how to make threat modeling more efficient and cost-effective with an automated, scalable, template-based approach.
Posted: 12 Jan 2018 | Published: 21 Sep 2017

Synopsys

How Does Mobile Device Management Differ from Traditional Security?
sponsored by Seqrite
WHITE PAPER: In this white paper explore the need for an mobile device management (MDM) system, as well as several best practices for selecting and deploying a comprehensive MDM solution to your enterprise in a way that will be beneficial to security, and intuitive for employees.
Posted: 28 Dec 2017 | Published: 28 Dec 2017

Seqrite

The Role of DevOps in Value Transformation
sponsored by Plutora
EGUIDE: In this expert e-guide, George Spalding, the executive vice president at Pink Elephant, discusses DevOps and the role it plays in value transformation.
Posted: 15 Jan 2018 | Published: 12 Jan 2018

 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement