Defense Industry Reports

Successfully Managing Programs and Risk in the Aerospace and Defense Industry
sponsored by Oracle Corporation
WHITE PAPER: Succeeding in this difficult environment requires an enterprise software solution that enables aerospace and defense companies to plan and execute programs and projects, demonstrate earned value compliance and manage resources and costs. Enterprise project portfolio management (EPPM) applications help meet these challenges.
Posted: 05 Apr 2010 | Published: 19 Feb 2010

Oracle Corporation

Four Key Elements to Improving Systems Engineering in Aerospace and Defense
sponsored by IBM
WEBCAST: This webcast explores four key ways in which A&D companies can improve SE and looks at IBM Rational® solutions and approaches that can help organizations deliver quality products on time and within budget, while increasing efficiency and improving collaboration.
Posted: 13 Dec 2010 | Premiered: Dec 13, 2010

IBM

Creating an Online Parts Catalog to Increase Part Sales and Improve Aftermarket Customer Satisfaction
sponsored by Enigma, Inc.
WHITE PAPER: This white paper documents the experiences of three companies that have implemented Enigma's electronic parts catalogs.
Posted: 11 Mar 2008 | Published: 01 Jan 2008

Enigma, Inc.

Requirements Engineering for the Aerospace and Defense Industry
sponsored by IBM
WHITE PAPER: A requirements engineering approach can help product and systems development organizations work in harmony. Read this white paper for an exploration of requirements engineering and its important role in product development.
Posted: 12 Apr 2010 | Published: 22 Jun 2009

IBM

Computer Weekly – 20 March 2018: Where neuroscience meets technology
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how computer scientists are using data, cloud and virtual reality to understand the brain and improve mental wellbeing. We analyse newly published government documents detailing the early problems with Universal Credit. And we look at how AI can help improve cyber security. Read the issue now.
Posted: 16 Mar 2018 | Published: 16 Mar 2018

ComputerWeekly.com

Computer Weekly – 26 January 2021: 'Salad as a service' – how tech could revolutionise farming
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how new technologies are supporting the rise of vertical farming, and could revolutionise food supply chains. We examine one of the biggest trends in the cloud – serverless computing. And Brexit has not yet ended the debate about UK-EU data protection. Read the issue now.
Posted: 08 Feb 2021 | Published: 26 Jan 2021

ComputerWeekly.com

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Strategies for Profitable Growth - Aerospace & Defense Manufacturing
sponsored by SAP AG
WHITE PAPER: Examine the comprehensive strategies, solutions, and best practices for the aerospace and defense (A&D) manufacturing industry based on technical and business expertise. Learn best practices and strategies for profitable growth in your business.
Posted: 21 Feb 2008 | Published: 01 Jan 2005

SAP AG

Customer Case Study: Armed™ Powered By Conquest Cyber
sponsored by MSFT ConquestCyber
CASE STUDY: How can you enable your organization to monitor and manage third party vendors’ cyber maturity? Read this case study to understand how a defense industrial base was able to efficiently evaluate their cybersecurity risk by leveraging the ARMED portal offering from Conquest Cyber.
Posted: 28 Jun 2022 | Published: 28 Jun 2022

TOPICS:  .NET
MSFT ConquestCyber

The Defender's Advantage Cyber Snapshot
sponsored by Mandiant
ANALYST REPORT: Exposed data breaches and leaked secrets in public code repositories alone account for 56% of critical security issues—and these are just the top two exploits. To detect and remediate similar issues, as well as bolster your own cyber defenses, read this Defender’s Advantage Cyber Snapshot report.
Posted: 11 Aug 2022 | Published: 11 Aug 2022

TOPICS:  Cybersecurity
Mandiant

Cyber defense: Understanding and combating the threat
sponsored by IBM
WHITE PAPER: The Global Defense Solutions Projects and Defense Exchange Conference (SPADE) is held annually to bring together organizations involved in network-centric operations, intelligence activities and other defense aspects. This resource explains some of the important topics.
Posted: 20 Jul 2012 | Published: 20 Jul 2012

IBM

Enable And Protect Your Remote Workforce
sponsored by AT&T Cybersecurity
WHITE PAPER: Download this white paper to learn about the cybersecurity challenges associated with an increasingly remote and virtual workforce, and what to look for in a remote security solution.
Posted: 08 Feb 2021 | Published: 30 Oct 2020

AT&T Cybersecurity

The First Line of Defense
sponsored by Palo Alto Networks
WHITE PAPER: Access this report to learn in depth about the steps used by cloud threat actors to target your cloud infrastructure and how you can implement actionable guidance to prevent them from infiltrating your organization.
Posted: 29 Jul 2022 | Published: 29 Jul 2022

TOPICS:  .NET
Palo Alto Networks

The Custom Defense - Your Answer to APTs
sponsored by Trend Micro
VIDEO: Explore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).
Posted: 17 Apr 2013 | Premiered: 17 Apr 2013

Trend Micro

New Mobile Risks Call for a Layered Security Approach
sponsored by SearchCIO.com
EBOOK: As enterprises' mobile footprints grow, so do the security risks. A single-pronged security approach is no longer enough. Download this handbook to discover how to build a layered enterprise mobile security strategy.
Posted: 09 Aug 2016 | Published: 09 Aug 2016

TOPICS:  CIOs
SearchCIO.com

Presentation Transcript: How Application Whitelisting Can Increase Your Desktop Security
sponsored by Faronics
PRESENTATION TRANSCRIPT: In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this Presentation Transcript, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus utilities.
Posted: 07 Jan 2010 | Published: 07 Jan 2010

Faronics

Robotics Advance With AI Technologies
sponsored by Wind River
WHITE PAPER: With the advent of more powerful AI and better communications technologies, industrial robotics are becoming more valuable than ever. Read on to learn how growth in the industrial robotics sector is being powered by innovative companies like Wind River which are aligning disparate, powerful technologies to drive unified growth.
Posted: 11 Jan 2022 | Published: 15 Nov 2021

Wind River

Layered Security Doesn't Stop Cybercriminals – but VDI Might
sponsored by Dell, Microsoft and Citrix
EGUIDE: This exclusive e-guide discusses ways cybercriminals successfully breach even the most well-secured enterprise defenses. Read on and learn how VDI can offer an enhanced level of security enterprises require.
Posted: 10 Feb 2016 | Published: 03 Feb 2016

Dell, Microsoft and Citrix

IT INDUSTRY OUTLOOK
sponsored by CompTIA
WHITE PAPER: CompTIA's IT Industry Outlook 2021 is a research report that explores the trends shaping the industry, its workforce and its business models. Learn factors that could positively and negatively impact business growth in 2021, 2021 budget projections compared to 2020, and more.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

CompTIA

2022 Cyberthreat Defense Report
sponsored by Menlo Security
ANALYST REPORT: Last year, 85.3 % of organizations experienced a successful cyberattack, while those experiencing over 6 attacks rose a new high of 40.7%, according to the 2022 Cyberthreat Defense Report. Access this report to gain a better understanding of how your perceptions, concerns, priorities, and defenses stack up against IT leaders around the world.
Posted: 12 Apr 2022 | Published: 13 Apr 2022

TOPICS:  .NET
Menlo Security

2022 Cyberthreat Defense Report
sponsored by (ISC)2 UK Ltd
ANALYST REPORT: Cyberthreat defense begins with an assessment of your business’ cybersecurity effectiveness relative to the prevailing threat landscape. To do this, look no further than the guidance provided in this CyberEdge Threat Defense Report. Download your copy to be privy to this can’t-miss wealth of information.
Posted: 21 Jul 2022 | Published: 21 Jul 2022

TOPICS:  .NET
(ISC)2 UK Ltd

Defense-In-Depth Security: Key to Keeping IT Safe
sponsored by SearchSecurity.com
EBOOK: The enterprise perimeter's demise is in part due to BYOD. Leverage this expert handbook to uncover an effective approach to constructing your IT security "fortress" and replacing the outdated idea of a security perimeter.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

SearchSecurity.com

A Prudent Approach To Ransomware Defense
sponsored by ServiceNow
ESG: Ransomware is the fastest growing malware threat, but detection and response are both challenging. Too often, ransomware is seen as solely a technology or security issue even though it impacts the entire enterprise. Turn this bad habit around by reading this ESG white paper to learn a 4-phase approach to ransomware defense.
Posted: 05 Jan 2022 | Published: 06 Jan 2022

TOPICS:  .NET
ServiceNow

Cybersecurity And The Hospitality Industry
sponsored by SubRosa
WHITE PAPER: In recent years, attackers have gained access to the networks of numerous big hotel chains, revealing the personally identifiable information of hundreds of thousands of customers each time. Read on to learn how you can close security gaps to maintain the robustness of your essential information systems.
Posted: 25 Jun 2022 | Published: 25 Jun 2022

TOPICS:  .NET
SubRosa

CORE Security and the Payment Card Industry Data Security Standard
sponsored by Core Security Technologies
WHITE PAPER: This informative resource explores a security testing method that ensures PCI DSS validation and compliance to keep payment cardholder data protected from cybercrime at all times.
Posted: 09 Oct 2013 | Published: 09 Oct 2013

Core Security Technologies

Edge Computing for the Department of Defense
sponsored by Red Hat
DATA SHEET: In order to obtain its objectives, the DoD is adopting a Joint All-Domain Command and Control (JADC2) framework. Access the data sheet for a brief overview of the DoD’s edge networking strategy and explores the benefits when applied to real-life situations that revolve around immediate high-pressure decision-making.
Posted: 17 May 2022 | Published: 17 May 2022

TOPICS:  .NET
Red Hat

DNS Firewalls and Defense Tactics
sponsored by Infoblox
EGUIDE: Gain an in-depth look at today's most popular domain name system (DNS) attacks and the defense tactics against them. In addition, uncover how a DNS firewall can help keep your organization safe.
Posted: 18 Feb 2013 | Published: 18 Feb 2013

Infoblox

The Industrialization of Fraud: Fighting Fire With Fire
sponsored by F5 Inc.
WHITE PAPER: This white paper, The Industrialization of Fraud: Fighting Fire with Fire, provides exclusive insight into sophisticated fraud strategies and tactics, as well as a series of best practices that can be implemented to thwart fraud attempts. Read on to learn more.
Posted: 31 Mar 2021 | Published: 30 Nov 2020

TOPICS:  Cybersecurity
F5 Inc.