IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive 7

RSS Feed   
Homeland Security Presidential Directive 7 Reports
Red Hat and Synopsis Podcast
sponsored by Red Hat Synopsys
PODCAST: Learn how to safeguard against poor security at every level and layer of your cloud-native environment in this podcast, which features insight from TechTarget, Red Hat, and Synopsis experts.
Posted: 22 Jul 2020 | Premiered: Jul 22, 2020

Red Hat Synopsys

Akamai Edge Security for Broadcasting and OTT Customers
sponsored by Akamai Technologies
ANALYST REPORT: Forrester recently surveyed more than 30 Akamai customers to understand the Total Economic Impact (TEI) of our security products and services on broadcasting and OTT organizations. Based on their responses, Forrester created an OTT media composite customer with $1.5 billion in revenue. Download the report to learn more.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

Akamai Technologies

Open Circle Solutions builds innovative golf management system with Red Hat OpenShift
sponsored by Red Hat
CASE STUDY: In this case study, learn why Open Circle Solutions, who focuses on market disruption, chose to work with Red Hat to accelerate development and ensure Agile integration—for both their customers and their own employees.
Posted: 30 Jul 2020 | Published: 30 Jul 2020

TOPICS:  IT Management
Red Hat

Tata Communications’ Secure Web Gateway
sponsored by TATA Communications
VIDEO: As applications, infrastructures and data continue to move to the cloud, ensuring users have appropriate and reliable access – regardless of location – is critical. In this short video, discover how Tata Communications’ Secure Web Gateway enables users with enhanced visibility and security.
Posted: 30 Jul 2020 | Premiered: 15 Aug 2018

TATA Communications

Don’t Just Educate: Create Cybersafe Behavior
sponsored by Mimecast
WHITE PAPER: Building a cyber-resilient culture involves more than a cut-and-paste security training program that ticks the compliance checklist. In this Forrester study, discover how applying proven behavioral science to SA&T programs can yield organization-wide cultural change and improve security at the people-level.
Posted: 23 Jul 2020 | Published: 30 Apr 2020


Keep Out Vulnerable Third-Party Scripts That Help Steal Data from Your Website
sponsored by Akamai Technologies
RESOURCE: Tap into this article to learn about Akamai’s intelligent edge platform that can detect malicious script activity, protect the integrity of webpages, and safeguard businesses.
Posted: 03 Aug 2020 | Published: 03 Aug 2020

Akamai Technologies

Computer Weekly – 4 August 2020: The UK's $500m space technology gamble
sponsored by
EZINE: In this week's Computer Weekly we ask why the UK gov-ernment is spending $500m on a bankrupt satellite technolo-gy company. After a European court quashes the EU-US data sharing agreement, we examine the implications for a UK-EU data protection deal after Brexit. And how have small cloud suppliers coped in the pandemic? Read the issue now.
Posted: 03 Aug 2020 | Published: 04 Aug 2020

Insider Threat Management and Cybersecurity Tools
sponsored by Proofpoint
EBOOK: The traditional notion of a perimeter is a thing of the past, people are the new perimeter. In this e-book, discover the tools and tactics organizations are using to defend against insider threats – evaluating the strengths and weaknesses of each approach and underlining the importance of people-centric security.
Posted: 28 Jul 2020 | Published: 28 Jul 2020


Guiding Your Cyber Security Team to Success How to Measure Results, Secure Budget, and Avoid Stress
sponsored by Thycotic
WEBCAST: Convincing the board of the security team's business value can often be challenging, as they're often perceived as being a maintenance role. That's why Thycotic's new webinar provides tips on how to communicate effectively to the board and help change their perceptions that restrict cybersecurity effectiveness.
Posted: 27 Jul 2020 | Premiered: Jul 30, 2020

TOPICS:  Security

Privileged Access Cloud Security For Dummies
sponsored by Thycotic
EBOOK: Cloud breaches have increased to 24% of all breaches per the 2020 Verizon Data Breach Investigations Report. 77% of these breaches involved compromised user credentials. Enter privileged access management (PAM). Understanding PAM is essential in giving users easy, secure cloud access, and so browsing this e-book may be beneficial.
Posted: 28 Jul 2020 | Published: 28 Jul 2020


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info