IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive 7

RSS Feed   
Homeland Security Presidential Directive 7 Reports
 
Rethinking Third-party Cyber Risk Management
sponsored by CyberGRX
WHITE PAPER: This white paper will help you ensure that your current third-party cyber risk management practices will translate into lower third-party cyber risk. It will also give you an understanding of where your company's practice sits on the third-party cyber risk management 'maturity curve.'
Posted: 12 Sep 2019 | Published: 12 Sep 2019

CyberGRX

Efficient Efficacy with Morphisec Unified Threat Prevention Platform
sponsored by Morphisec, Inc.
ANALYST REPORT: This ESG Technical Validation documents evaluation of Morphisec's moving target defense-powered Unified Threat Prevention Platform. Read on for a look at the operational simplicity of the platform and the efficacy of its threat prevention capabilities.
Posted: 10 Sep 2019 | Published: 10 Sep 2019

Morphisec, Inc.

Cybersecurity Effectiveness Podcast: Ed Amoroso
sponsored by Verodin
PODCAST: Tune into this episode of the Cybersecurity Effectiveness Podcast to hear Brian Contos chat with Ed Amoroso, former SVP and CSO of AT&T and current CEO of TAG Cyber LLC, about priorities and advice for building a top-notch security team.
Posted: 06 Sep 2019 | Premiered: Sep 6, 2019

Verodin

2020 is the Year to Make Your Move to a Modern Workspace
sponsored by Lenovo
WHITE PAPER: Download this report, paired with research from Forrester, to learn about the five trends that are slated to impact workforce technology in 2020 – and find out how IT departments are re-structuring their desktop, mobile, and cloud computing strategies accordingly.
Posted: 09 Sep 2019 | Published: 31 May 2019

Lenovo

Trend Report: Threats are Multiplying and Becoming More Sophisticated
sponsored by Cisco Umbrella
ANALYST REPORT: Despite all the buzz about security and staying prepared, malicious attackers are more audacious than ever. Download this research report to explore popular threats such as phishing, ransomware, cryptomining and more. Also, learn how Cisco Umbrella can help keep your organization secure as threat risks continue to escalate.
Posted: 03 Sep 2019 | Published: 03 Sep 2019

Cisco Umbrella

Protection Inside and Outside the Office: The New State of Cybersecurity
sponsored by Cisco Umbrella
RESOURCE: Download this infographic to explore key findings from the Enterprise Strategy Group's survey of 450 cybersecurity experts on their experience protecting a network without perimeters.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Cisco Umbrella

Defending the Digital Enterprise
sponsored by Gigamon
WHITE PAPER: Given the amount of encrypted traffic and the threat vector it now poses, you need a way to efficiently decrypt traffic, share it with tools and then re-encrypt it. In this white paper, discover 7 things you need to do to successfully decrypt your SSL and TLS traffic.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Gigamon

Protecting Point-of-Sale Systems
sponsored by Morphisec, Inc.
PRODUCT OVERVIEW: With their highly valuable payment card and personal sensitive information, Point-of-Sale systems present a ripe target for cybercrime. Modern POS environments are complicated systems with multiple entry points for attack. In this brief, learn about the anatomy of a POS attack and what organizations can do to prevent against these attacks.
Posted: 09 Sep 2019 | Published: 09 Sep 2019

Morphisec, Inc.

Tech Powering your CX Might be Dragging Revenue
sponsored by The Media Trust
RESOURCE: Unknown third-party code outside of your control can introduce new risks or heighten existing ones. Read on to learn about digital risk scans and how you can reduce digital revenue threats like customer information theft, data leakage, site latency, and more.
Posted: 13 Sep 2019 | Published: 13 Sep 2019

The Media Trust

Privileged Access Management Buyers' Guide
sponsored by Centrify Corporation
WHITE PAPER: This buyers' guide is designed to help you choose the right privileged access management solution for your organization. Read on for the 9 major areas needed for your company to achieve strong privileged access management, and compare the features and capabilities to look for when selecting a solution.
Posted: 30 Aug 2019 | Published: 30 Aug 2019

Centrify Corporation
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement