IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Presidential Decision Directive 63

RSS Feed   
Presidential Decision Directive 63 White Papers (View All Report Types)
 
Making Application & Infrastructure Vulnerability Management More Effective
sponsored by ZeroNorth
WHITE PAPER: Organizations are struggling to keep up with the dizzying pace it takes to roll out new software capabilities, which only deepens the challenge of keeping up with risks across applications and infrastructure. In this white paper, discover 5 steps you can take to help begin your Application and Infrastructure Vulnerability Management Program.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

ZeroNorth

Threat Intelligence: Far-Fetched Idea or Must-Have Security Tactic? How Every Ciso Can Make It a Priority
sponsored by Mimecast
WHITE PAPER: If threat intelligence isn't part of your cyber resilience strategy in some capacity, you have a massive gap on your hands. And you may be blindsided by a phishing attack, malware incident or worse. In this white paper, learn how CISOs can make threat intelligence a priority in their cyber resilience planning.
Posted: 24 Sep 2019 | Published: 24 Sep 2019

Mimecast

Regulatory Updates Roundup Of 10 Recent FINRA And SEC Violations And Penalties
sponsored by Smarsh
WHITE PAPER: Over the past year, the SEC and FINRA have been enforcing communications supervision compliance regulations throughout the financial services industry. In this white paper, discover 10 of the most notable violations from Smarsh's monthly Regulatory Update blog posts to review how they occurred.
Posted: 26 Sep 2019 | Published: 26 Sep 2019

Smarsh

Patch Management: Your Biggest Ally in the War Against Cybercrime
sponsored by Panda Security
WHITE PAPER: The majority of attacks and exploits today take advantage of outdated systems and third-party applications, exploiting known vulnerabilities. In this white paper, learn about the dangers of vulnerabilities, including the new BlueKeep vulnerability, and ways you can keep your organization safe.
Posted: 10 Oct 2019 | Published: 10 Oct 2019

Panda Security

Detecting and Preventing Cybercrime and Fraud
sponsored by Concur Technologies
WHITE PAPER: In this white paper, explore what CFOs from some of Australia's leading businesses have to say about their cybercrime and fraud experiences and the risks facing their businesses today. Also, explore advice for businesses looking to tackle fraud.
Posted: 18 Sep 2019 | Published: 18 Sep 2019

Concur Technologies

GandCrab Ransomware Analysis Report
sponsored by Versa Networks
WHITE PAPER: A recent ransomware which has become viral since January 2018 is named GandCrab. The developers have been continuously updating and releasing improved versions, with approximately 6 variants observed to date. This white paper will take a quick look into these variants and provide insightful into how they are impacting users.
Posted: 16 Oct 2019 | Published: 16 Oct 2019

Versa Networks

A Field Guide to Understanding the Tactics, Techniques and Attack Vectors Used by Cybercriminals
sponsored by Radware
WHITE PAPER: The threat landscape is as diverse as it is sophisticated, thanks largely to the fact that the skills and tools behind launching cyberattacks have become commoditized. In Radware's Hacker's Almanac, gain an understanding the threat landscape and current tactics, techniques and procedures used by today's cybercriminals.
Posted: 20 Sep 2019 | Published: 20 Sep 2019

Radware

Defining Security for a Kubernetes Deployment
sponsored by Aporeto
WHITE PAPER: For a DIY Kubernetes deployment, it’s very important to understand basic hygiene and follow best practices for securing the Kubernetes cluster in itself. Read on to learn more about securing workloads deployed in a Kubernetes cluster.
Posted: 18 Oct 2019 | Published: 18 Oct 2019

Aporeto

Securing Your Modern Network with AWS and Cisco Stealthwatch Cloud
sponsored by Amazon Web Services
WHITE PAPER: The security of the network, which was always important to the network admin, has become a top priority. However, you can’t fix what you can’t see. In this white paper learn how Stealthwatch Cloud can help you to see your network activity, identify the signs of potential threats, and more.
Posted: 08 Oct 2019 | Published: 08 Oct 2019

Amazon Web Services

Hybrid Multi-cloud Networking that Delivers a Better Application Experience
sponsored by Citrix
WHITE PAPER: Cloud is changing the fundamentals of how IT teams deliver applications and manage their performance. Dive into this solution brief to learn about a hybrid multi-cloud networking platform designed to deliver a better user experience from Citrix.
Posted: 09 Oct 2019 | Published: 09 Oct 2019

Citrix
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement