IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

HSPD 7

RSS Feed   
ALSO CALLED: Homeland Security Presidential Directive 7, Presidential Decision Directive 63, Homeland Security Presidential Directive No. 7, Protecting America's Critical Infrastructures, PDD-63, HSPD-7, PDD 63
DEFINITION: HSPD-7 (Homeland Security Presidential Directive No. 7) is a directive that was issued by U.S. President George W. Bush in December, 2003 to update policies intended to protect the country from terrorist attacks. This directive superseded the earlier PDD-63 (Presidential Decision Directive No. 63), which was issued by President Clinton in May of 1998. The original purpose of PDD-63 (which predated  … 

HSPD 7 definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
HSPD 7 Reports
1 - 25 of 6646 Matches Previous Page  |  Next Page
10 AI and machine learning use cases in ITSM
sponsored by ComputerWeekly.com
EGUIDE: AI-enabled ITSM, while still maturing, promises to greatly improve the speed and quality of IT service management. Here are 10 AI and machine learning use cases for ITSM
Posted: 12 Jul 2020 | Published: 13 Jul 2020

ComputerWeekly.com

10 Best Practices for Internet Security
sponsored by Verizon
RESOURCE: Beyond firewalls, antivirus software and other security capabilities, organizations need to understand and address other vulnerability areas that’s don’t require spending to solve. This article from Verizon highlights 10 best internet security practices to help your organization maintain good security hygiene, read on to get started.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Verizon

10 Cybersecurity Best Practices for Securing Remote Workers
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: As a result of the pandemic, organizations are being forced to re-allocate their resources in order to focus on securing their predominantly remote workers. In order to help organizations adjust to the new normal, Arctic Wolf created this checklist of 10 WFH best practices – read on to get started.
Posted: 31 Aug 2020 | Published: 31 Aug 2020

Arctic Wolf Networks, Inc.

10 Endpoint Security Problems and How the Cloud Solves Them
sponsored by VMware International Unlimited Company
WHITE PAPER: In today’s world of increasingly frequent and complex threats, the responsibility of protecting endpoints can no longer be left to traditional security tactics. In this whitepaper, discover why & how organizations are embracing cloud-based endpoint security platforms.
Posted: 18 May 2020 | Published: 18 May 2020

VMware International Unlimited Company

10 Get-back-to-work Dimensions Every Business Needs to Digitize
sponsored by Domo Technologies
RESOURCE: Check out this blog post to learn 10 aspects of the pandemic that organizations can and should monitor in order to reopen as safely as possible and discover how data-driven insights can help.
Posted: 06 Aug 2020 | Published: 06 Aug 2020

Domo Technologies

10 Questions to Ask About Your Office 365 Deployment
sponsored by Mimecast
ANALYST REPORT: In this Osterman Research white paper, explore the key issues to consider when evaluating the email security capabilities of Office 365.
Posted: 05 Aug 2019 | Published: 30 Jun 2019

Mimecast

10 ways to increase ROI
sponsored by zCost Management
RESOURCE: Learn the 10 major ways you can rein in mainframe operating costs.
Posted: 09 Jun 2020 | Published: 09 Jun 2020

TOPICS:  IT Management
zCost Management

10 Ways to Take MITRE ATT&CK From Plan to Action
sponsored by Splunk
WHITE PAPER: The MITRE ATT&CK framework helps organizations manage cyber risk better and plan what data needs to be available for when the time comes for cyberthreat detection or investigating a security incident. Download "10 Ways to Take the MITRE ATT&CK Framework from Plan to Action" to learn how it can help your security strategy today.
Posted: 06 Mar 2020 | Published: 06 Mar 2020

Splunk

10 Ways to Take MITRE ATT&CK From Plan to Action
sponsored by Splunk
WHITE PAPER: In this e-book, explore how the MITRE ATT&CK framework helps different parts of the organization.
Posted: 10 Aug 2020 | Published: 10 Aug 2020

Splunk

100 Days of Coronavirus (COVID-19)
sponsored by Mimecast
WHITE PAPER: To better understand how the coronavirus pandemic has been (and will be) exploited by malicious users, Mimecast created this analyst report, 100 Days of Coronavirus (COVID-19), which analyzes activity across the first 100 days. Download the report to unlock the key trends and recommendations.
Posted: 15 Jul 2020 | Published: 31 May 2020

Mimecast

11-Minute Webinar: Strategies to Work from Anywhere
sponsored by Okta
WEBCAST: Telework involves more than getting your employees up and running with video conferencing – it requires a massive shift in how people work and how you think about securing users and their devices. Don’t float adrift in a sea of distributed workforce challenges – watch this 10-minute webinar and learn how to manage access and security.
Posted: 30 Sep 2020 | Premiered: Jul 24, 2020

Okta

12 Essential Features of Advanced Endpoint Security Tools
sponsored by Claranet
EGUIDE: Endpoint protection of enterprise systems is an efficient method of managing software deployment and enforcing IT security operations' policies. However, it does more than protect a network from malware. Download this e-guide to learn how endpoint security can be used for a number of operation monitoring functions and data backup strategies.
Posted: 17 Sep 2020 | Published: 17 Sep 2020

Claranet

12 Reasons Why You Need Stronger Mobile App Security
sponsored by NowSecure
RESOURCE: Whether it’s for internal communication, enhancing customer experience or part of a digital transformation initiative, mobile applications play a critical role and ensuring their protection is paramount. Download this infographic to discover 12 reasons why organizations need stronger mobile app security strategies.
Posted: 22 Jun 2020 | Published: 22 Jun 2020

NowSecure

13 Email Threat Types to Know about Right Now
sponsored by Barracuda
RESOURCE: As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.
Posted: 07 May 2020 | Published: 01 May 2020

Barracuda

"Hacking as a Service," and Other Emerging Threats
sponsored by SearchSecurity.com
EZINE: Lethal threats to enterprise security are emerging from every which way. Access this exclusive edition of Information Security Magazine to learn just what you're up against.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

SearchSecurity.com

10 Best Practices For Reducing Spend In AWS
sponsored by CloudHealth by VMware
WHITE PAPER: Access these 10 proven best practices for cost reduction and optimization in Amazon Web Services (AWS).
Posted: 27 Nov 2018 | Published: 27 Nov 2018

TOPICS:  IT Management
CloudHealth by VMware

10 Common Mistakes of Incident Responders
sponsored by Intel Security
WHITE PAPER: Learn from your peers. Compare these 10 common mistakes to your incident response practices to improve effectiveness.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

TOPICS:  IT Management
Intel Security

10 Essential Elements for a Secure Enterprise Mobility Strategy
sponsored by Citrix
WHITE PAPER: This resource guides you through the top 10 considerations when developing a mobile strategy.
Posted: 30 Apr 2014 | Published: 31 Mar 2014

Citrix

10 Essentials for Secure EMM
sponsored by Citrix
WHITE PAPER: This resource offers 10 key guidelines to securing mobile strategies so that organizations are confident in their defenses against theft and loss while users are satisfied with performance.
Posted: 09 May 2014 | Published: 01 Jun 2014

Citrix

10 Must Haves for Secure Enterprise Mobility
sponsored by Citrix
WHITE PAPER: In this resource, discover 10 valuable features to include when creating a mobile security strategy so that your organization can fully realize the benefits of BYOD policies.
Posted: 27 Dec 2013 | Published: 31 May 2013

Citrix

10 Network Security Tools and Tests Everyone Should Use
sponsored by Global Knowledge
WHITE PAPER: This paper provides a list of 10 security tools or tests that will help you check out suspicious issues and keep ahead of new risks and threats.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

Global Knowledge

10 Reasons LinuxONE is the Best Choice for Linux Workloads
sponsored by IBM
WHITE PAPER: Here's a freebie: Linux applications on x86 servers is 65% more expensive than on LinuxONE servers. Read on for 10 more.
Posted: 06 Apr 2017 | Published: 06 Apr 2017

TOPICS:  IT Management
IBM

10 Steps for Early Incident Detection
sponsored by Tripwire, Inc.
WHITE PAPER: The earlier a security breach is detected, the faster an organization can recover. View this informative white paper to learn more about the ten steps to faster detection of security incidents. IT security is only as effective as it's response time, so be sure you're prepared for a breach.
Posted: 02 Oct 2012 | Published: 02 Oct 2012

Tripwire, Inc.

10 Ways to Build a Better Big Data Security Strategy
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This informative whitepaper explores the role of Big Data and outlines 10 best practices for Big Data security.
Posted: 12 May 2014 | Published: 31 Jan 2014

Hewlett-Packard Enterprise

15 Point Checklist Cloud Data Protection
sponsored by SkyHigh
WHITE PAPER: This resource offers 5 exclusive tips for protecting business data across all cloud services.
Posted: 28 May 2014 | Published: 28 May 2014

SkyHigh
1 - 25 of 6646 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info