IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive No. 7

RSS Feed    Add to Google    Add to My Yahoo!
Homeland Security Presidential Directive No. 7 Reports
Insuring the uninsurable: Is cyber insurance worth its salt?
sponsored by
RESEARCH CONTENT: This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.
Posted: 12 Sep 2017 | Published: 12 Sep 2017

Is DNS Your Security Achilles Heel?
sponsored by Akamai Technologies
WHITE PAPER: This white paper explains how many attackers take advantage of recursive DNS, which almost every action on the internet relies on. Uncover 6 best practices you can follow to mitigate the risks.
Posted: 19 Sep 2017 | Published: 31 Jul 2017

Akamai Technologies

5 Ways to Ensure Digital Business Success
sponsored by Entrust, Inc.
WHITE PAPER: By 2020, 72% of the world's employees will be mobile workers and more than 20 billion devices will be connected to the internet of things. Read this white paper to uncover ways to ensure protection within your business as digital platforms become dominant.
Posted: 20 Sep 2017 | Published: 31 Dec 2016

Entrust, Inc.

Stop Password Sprawl with App Single Sign-on
sponsored by Centrify Corporation
WHITE PAPER: In this white paper, learn the key considerations you should ask before investing and deploying a single sign-on vendor to ensure a smooth transition that aligns with security best practices.
Posted: 12 Sep 2017 | Published: 12 Sep 2017

Centrify Corporation

Defender Lifecycle Model
sponsored by Gigamon
RESOURCE: In this short solution brief, learn how the Defender Lifecycle Model can help network viability to automate and accelerate the identification of threats.
Posted: 19 Sep 2017 | Published: 31 Aug 2017


2017 Midyear Security Roundup: The Cost of Compromise
sponsored by TrendMicro
WHITE PAPER: In the first half of 2017 there have been 83 million total ransomware threats detected, and an average of 28 new families detected. Read this white paper to reveal ransomware attack costs and reviews of threat landscapes, so that enterprises can move forward to protect themselves against WannaCry, Petya and more.
Posted: 21 Sep 2017 | Published: 21 Sep 2017


As a DevOps Engineer, What Should I know about Security Tools?
sponsored by CyberArk Software, Inc
WEBCAST: Watch this webcast to reveal what you, as a DevOps engineer, should know about security tools and protection.
Posted: 20 Sep 2017 | Premiered: Sep 20, 2017

CyberArk Software, Inc

2017 Salary Survey ANZ Infographic
sponsored by
DATA SHEET: Download the 2017 Salary Survey ANZ infographic to discover the latest information about demographics, training, earnings and women in IT.
Posted: 12 Sep 2017 | Published: 13 Sep 2017

2017 GDPR Report
sponsored by Avnet
WHITE PAPER: Research by Vanson Bourne shows that 86% of organizations worldwide are concerned that a failure to adhere to the upcoming GDPR could have a major negative impact on their business. Take a closer look at this white paper to reveal research statistics regarding GDPR compliance.
Posted: 18 Sep 2017 | Published: 18 Sep 2017


Windows Defender: Advanced Threat Protection (ATP)
sponsored by Microsoft
RESOURCE: In this resource, learn how Windows Defender ATP can help the ability to detect and remediate advanced attacks and data breaches on your networks.
Posted: 15 Sep 2017 | Published: 15 Sep 2017

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement