IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive 7

RSS Feed   
Homeland Security Presidential Directive 7 Reports
 
A Complete Guide for How Organizations Buy Training
sponsored by Global Knowledge
EBOOK: Save a copy of this guide to learn how to strategically budget and buy training and development programs for your organization, including how to purchase training with vendor credits, take advantage of prepay plans, tuition reimbursements, and more.
Posted: 20 Jan 2020 | Published: 20 Jan 2020

Global Knowledge

Increasing Speed and Risk: How to Secure Third-Party Software Code
sponsored by WhiteHat Security
WEBCAST: When DevOps came to the IT scene, organizations rushed toward adoption. Now, we’re realizing that in that rush, IT overlooked some crucial security measures. In this webinar, Forrester and WhiteHat experts explore how to hit the brakes and assess your DevOps security strategy. Watch the webinar here.
Posted: 09 Jan 2020 | Premiered: Jan 9, 2020

TOPICS:  Security
WhiteHat Security

The Future of Identity
sponsored by Mitek Systems, Inc.
WHITE PAPER: Identity will be far different in the years ahead than in all the years before. What’s changing? For better? For worse? In this white paper, discover Mitek’s point of view about today’s state of identity and how to steer toward a more advantageous future of identity.
Posted: 22 Jan 2020 | Published: 22 Jan 2020


Webinar: You Need Live Patching to Achieve SOC2 Compliance
sponsored by CloudLinux
VIDEO: In this webinar, join industry experts as they share best practices and use cases of data protection and vulnerability management for maintaining compliance in their Linux-based systems. Continue to view the webinar.
Posted: 24 Jan 2020 | Premiered: 11 Jul 2019


CIO Trends #10: Middle East
sponsored by ComputerWeekly.com
EGUIDE: If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes are a big one. Also find out how Saudi Arabia could become the Silicon Valley of the Middle East. Read more about it in this issue of our CIO Trends Middle East series.
Posted: 16 Jan 2020 | Published: 16 Jan 2020

ComputerWeekly.com

ThreatQ for Government Agencies
sponsored by ThreatQuotient
DATA SHEET: As government agencies are considered critical infrastructure, they are under constant attack from hackers, political activists and foreign state-sponsored actors. The first step to detecting, responding and recovering from incidents is finding a way to increase situation awareness. Download this brief to learn more.
Posted: 21 Jan 2020 | Published: 21 Jan 2020

ThreatQuotient

6 Steps to Securing Enterprise Data
sponsored by BigID
WHITE PAPER: Organizations of all sizes need a strong data-centric security policy. Start with these 6 key steps to secure sensitive and personal data across the enterprise.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

BigID

Pervasive Protection: Enabling Secure Work from Anywhere
sponsored by Malwarebytes
RESOURCE: The digitally transformed workplace consists of employees that expect to get their work done anywhere. This mix of onsite and remote workers, as well as the explosion of devices and applications they now use, presents a security challenge. In this infographic, find out what security managers need to know to defend against today’s cyberattacks.
Posted: 20 Jan 2020 | Published: 20 Jan 2020

Malwarebytes

How to Become Cyber Resilient: A Digital Enterprise Guide
sponsored by Malwarebytes
WHITE PAPER: Tap into this white paper to explore the current market influences that impact how an organization pursues cyber resilience, the key methods that should be adopted in becoming cyber resilient, and the reasons why cyber resilience can transform an organization into a digital enterprise highly focused on growth.
Posted: 24 Jan 2020 | Published: 24 Jan 2020

Malwarebytes

Secure Coding Practices: Use Software Composition Analysis
sponsored by WhiteHat Security
WEBCAST: Software composition analysis (SCA) is now a necessary process in application development. Why? Because only 10% of code is written end-to-end by an organization’s developers. Let’s say that another way: applications are built with 90% borrowed code. Watch this webinar to understand and compare your security options.
Posted: 09 Jan 2020 | Premiered: Jan 9, 2020

TOPICS:  Security | Software
WhiteHat Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info