IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive 7

RSS Feed   
Homeland Security Presidential Directive 7 Reports
 
Empower Your Security Analysts
sponsored by McAfee
WEBCAST: Are you looking to drive SOC efficiency? Are you seeking greater automation, threat hunting and endpoint visibility and control than your current solution delivers? Watch this webcast to go in-depth on security operations with a focus on alert quality, SOC efficiency and securing endpoints at scale.
Posted: 19 Oct 2020 | Premiered: Oct 19, 2020

McAfee

Prevent Fraud and Phishing Attacks With DMARC
sponsored by Mimecast
PRODUCT OVERVIEW: The FBI estimates that between 2013 and 2018, cybercriminals stole more than $12 billion using business email compromise (BEC) attacks. To prevent BEC and phishing, organizations are turning to email authentication tools. Read this Forrester report, which analyzes the features and capabilities of Mimecast’s email authentication offering.
Posted: 21 Oct 2020 | Published: 31 Mar 2020

Mimecast

The World Just Changed, and IT Operations is on the Front Lines
sponsored by ServiceNow
WHITE PAPER: Dive inside this guide to learn what it takes to properly equip your IT operations team with the tools to keep up with the demands of the new digital economy, including proactive issue prediction, automated resolution processes, and more.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

ServiceNow

Cybersecurity Automation for Dummies
sponsored by Infoblox
EBOOK: Automation is quickly becoming one of the most valuable capabilities for providing security across growing network landscapes. This eBook, Cybersecurity Automation for Dummies, provides additional insight and expert guidance regarding the role of automation in security programs.
Posted: 20 Oct 2020 | Published: 20 Oct 2020

Infoblox

Managed Detection & Response (MDR): Selective Outsourcing for Understaffed SOCs
sponsored by Dell SecureWorks
WHITE PAPER: Even though the managed detection and response (MDR) market is in its infancy, interest and adoption has spiked dramatically – with most organizations (79%) either currently evaluating or considering adopting an MDR tool. Read this research report for a deep dive into the MDR market, common approaches and guidance for selecting an MDR provider.
Posted: 19 Oct 2020 | Published: 31 May 2020

Dell SecureWorks

Automated Cloud Governance: The ONUG Collaborative
sponsored by Concourse Labs
WHITE PAPER: As organizations continue to embrace cloud capabilities, ensuring security and governance across these new environments becomes more important than ever. This e-guide provides a comprehensive overview of the most effective way to achieve automated cloud governance (compliance & security at the speed of DevOps) – read on to get started.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

Concourse Labs

Cybersecurity in the Remote Work Era: A Global Risk Report
sponsored by Keeper Security Inc
WHITE PAPER: One of the business functions most affected by the spread of COVID-19 and the subsequent era of remote work is IT security. Read this comprehensive research report, Cybersecurity in the Remote Work Era: A Global Risk Report, for a closer look at the new risks to look out for, how security postures have changed, and other key findings.
Posted: 19 Oct 2020 | Published: 19 Oct 2020

Keeper Security Inc

How to Monitor Kubernetes with Confidence
sponsored by AppDynamics
WHITE PAPER: In this comprehensive guide, learn how to monitor Kubernetes with confidence. The guide covers a brief history of Kubernetes, common challenges to monitoring and how to avoid them, and much more. Whether you’re completely new to Kubernetes or looking for a refresher, make sure to save this guide for reference.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

AppDynamics

6 Ways to Accelerate and Derisk Migration to AWS
sponsored by AppDynamics
WHITE PAPER: Application performance management (APM) has taken center stage. With APM strategies, businesses can move quickly and securely to the cloud with consistent end-to-end application monitoring. Discover 6 ways to use APM to migrate to AWS in this guide.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

AppDynamics

Unmasking BEC and EAC
sponsored by Proofpoint
EBOOK: Tap into The Complete Guide to Stopping Business Email Compromise, Email Account Compromise and Today’s Biggest Impostor Threats for concrete steps on how to keep your users safe.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

Proofpoint
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info