IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive 7

RSS Feed   
Homeland Security Presidential Directive 7 Reports
 
Operationalizing Privacy Policy from Discovery to Enforcement
sponsored by Ionic Security
WEBCAST: Hear from BigID and Ionic Security in this on-demand webinar to learn how you can automate the identification and mitigation of risk to personal data demanded by CCPA and GDPR.
Posted: 31 Oct 2019 | Premiered: Oct 31, 2019

Ionic Security

Forbes Insights: As CIOs and CMOs Collaborate, Competitive Advantage Rises
sponsored by Dell EMC and VMware
WHITE PAPER: Though the overlap might not be obvious, CIOs and CMOs possess a relationship that can make or break digital transformation objectives. Save a copy of this Forbes Insights report to see how real-world C-suite execs are molding their digital transformation strategies through collaboration.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

TOPICS:  CIOs | IT Management
Dell EMC and VMware

RPA Security Best Practices
sponsored by CyberArk Software, Inc
WEBCAST: Robotic process automation (RPA) enables business to improve productivity, quality & accuracy of data, and compliance. In order to ensure continued RPA benefit, security is critical.In this guide, uncover best practices for securing RPA, the growing risks & how organizations can better protect their software robots.
Posted: 07 Nov 2019 | Premiered: Nov 7, 2019

CyberArk Software, Inc

Digital Transformation: Are We Finally Past the Unmet Expectations?
sponsored by Couchbase
WHITE PAPER: This comprehensive 2019 survey of 450 heads of digital transformation provides the critical insights and analysis you need to plan your next steps.
Posted: 31 Oct 2019 | Published: 31 Oct 2019

Couchbase

DevSecOps delivers better business
sponsored by ComputerWeekly.com
EGUIDE: Firms need to consider the move from DevOps to DevSecOps. This e-guide focuses on the benefits of DevSecOps, paints a picture of the rise of this approach, and explains why using the right DevSecOps tools leads to more secure development. DevSecOps delivers better business, and it's time for you to find out how and why.
Posted: 29 Oct 2019 | Published: 29 Oct 2019

ComputerWeekly.com

Best Practices for Using Open Source Code
sponsored by TechTarget
RESOURCE: A huge amount of applications are now built with open source components, but what affects does this open source code use have on your apps later on down the line? Take a look at this guide, Open Source Compliance, Security, & Risk Best Practices to learn how to monitor your open source code and make sure you're using it safely.
Posted: 02 Nov 2019 | Published: 02 Nov 2019

TOPICS:  Security | Software
TechTarget

TITUS Times: The Politics of Data Protection
sponsored by TITUS
WHITE PAPER: Most breaches that occur at the end user level aren’t malicious. The ideal security strategy addresses people, processes and policy with serious consideration given to the end user. So, rather than dictate policies, involve your end users as you develop your security strategies. Discover why it is critical to focus on the end user’s point of view.
Posted: 29 Oct 2019 | Published: 29 Oct 2019

TITUS

Learnings from The Frontlines: 4 Steps to Protect What Attackers Are Really After
sponsored by Cyber-Ark Software
WHITE PAPER: Forrester estimates that 80% of security breaches involve privileged credentials & it makes sense why: attackers are targeting those who have access to sensitive data & infrastructure. In this guide, discover how to think like an attacker in order to develop a security strategy to protect your critical assets.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

Cyber-Ark Software

Don’t Let Misconfigurations Leave a Hole in Your Firewall
sponsored by FireMon
PRODUCT OVERVIEW: Human error is inevitable in manual processes. In this product overview, discover the 10 misconfigurations that cause data breaches and how FireMon Automation can help to eliminate them.
Posted: 05 Nov 2019 | Published: 04 Nov 2019

FireMon

Cisco Umbrella: Reporting You Can Count On
sponsored by Cisco Umbrella
RESOURCE: Deploying a Cisco Umbrella free trial is simple, but it can be hard to figure out where to start. Download this resource to find 3 reports that will help you get started.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

Cisco Umbrella
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement