IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive 7

RSS Feed   
Homeland Security Presidential Directive 7 White Papers (View All Report Types)
 
Preventing Fraud in Online Gift Cards
sponsored by Riskified
WHITE PAPER: Adapting to the ever-changing fraud landscape while providing a good customer experience is a challenge many organizations that sell gift cards struggle with. Download this report to explore key fraud trends in the online gift card industry, and helpful tips for boosting order approval rates.
Posted: 08 Aug 2018 | Published: 08 Aug 2018

Riskified

Fighting Account Takeover (ATO) Fraud Attacks
sponsored by Riskified
WHITE PAPER: In this guide, get a rundown of account takeover (ATO) attacks – from how fraudsters get the credentials they need to access accounts to their modus operandi once they're in and what you can do after detecting the threat.
Posted: 03 Aug 2018 | Published: 30 Apr 2018

Riskified

The Software-Defined Data Center Comes Of Age
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Designed to keep operations professionals up to speed, this Forrester report explains the key industry trends surrounding SDDC, including how it's redefining contemporary data centers, presenting fresh opportunities for growth, and altering the vendor landscape.
Posted: 31 Jul 2018 | Published: 30 Nov 2017

Hewlett Packard Enterprise

When School is Out, IT is In
sponsored by Samanage
WHITE PAPER: While normally bustling campuses have been quiet during summer weeks, IT teams have been hard at work behind the scenes preparing and maintaining the infrastructure that supports it all. Click to learn about the challenges and the innovative projects that campus IT teams have been tackling head-on.
Posted: 13 Aug 2018 | Published: 13 Aug 2018

Samanage

Why Choose Oracle Linux?
sponsored by Oracle Corporation
WHITE PAPER: Keep reading to learn about the key features that make Oracle's Linux platform so appealing amongst the swath of open-source commercial options, including its lower cost of ownership, zero-downtime patching protocol for airtight security, and more.
Posted: 08 Aug 2018 | Published: 31 May 2018

Oracle Corporation

Age of the Cyber Hunter: How a New Generation of Threats Changed the Cybersecurity Paradigm
sponsored by Rackspace Microsoft
WHITE PAPER: Effective security now requires firms to assume penetration and continually scan their environments for ongoing malicious activity. In this white paper, take a closer look at today's advanced persistent threats, and explore state-of-the-art techniques and technologies to detect and counteract them.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

Rackspace Microsoft

IBM Security Access Manager: Tolly Test Report
sponsored by IBM
WHITE PAPER: Find out how your organization could benefit from a Security Access Management tool that ensures security within your web applications, while receiving flexible risk-based access, strong authentication capabilities, and more.
Posted: 01 Aug 2018 | Published: 30 Jun 2016

IBM

Old vs. New: The Impact of Automated IT
sponsored by DXC Concerto
WHITE PAPER: Automation through the cloud has continued to evolve, and every corner of IT, from the overall infrastructure to the individual desktop, can stand to gain from it. Check out this comparison tool to see how the capabilities of IT throughout the stack have changed via automation.
Posted: 13 Aug 2018 | Published: 13 Aug 2018

DXC Concerto

Transform Your IT Security in 3 Steps
sponsored by VMware
WHITE PAPER: Security is critical; it should be on the mind of every business, and it should never be sacrificed at the expense of some other endeavor. Download this white paper to unveil 3 focus areas for transforming your IT security into a reliable workhorse for the digital workspace.
Posted: 31 Jul 2018 | Published: 31 Dec 2017

VMware

Executing on NIST SP 800-190
sponsored by Twistlock, Inc.
WHITE PAPER: When apps scale out, the old method of manually creating and maintaining security rules becomes impractical. Together The National Institutue of Standards and Technology (NIST) and Twistlock secure container environments at scale and enforce policies to secure container workloads across the environment.
Posted: 08 Aug 2018 | Published: 08 Aug 2018

 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement