IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive 7

RSS Feed   
Homeland Security Presidential Directive 7 Reports
 
Next-Generation ITAM
sponsored by ServiceNow
WHITE PAPER: Based on global research and industry expertise, find out what technology choices, processes, and policy shifts are giving front-running ITAMs the ability to keep pace with the latest digital assets.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

TOPICS: 
ServiceNow

GE Digital Case Study
sponsored by WhiteSource
CASE STUDY: Breaches of security in the industrial space can have very real-world consequences, increasing the need for GE Digital to implement strong security practices to reduce the risk of exploitable vulnerabilities in their applications. In this case study, find out how GE used WhiteSource to do so.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

TOPICS: 
WhiteSource

The Power of Bro and Why You Should Include It in Your Security Infrastructure
sponsored by CoreLight
VIDEO: Tune into this webinar as Matt Bromiley of SANS Institute and Seth Hall of CoreLight, explain the power of Bro, where it fits in the security landscape and how it can help incident responders do their jobs quickly and effectively.
Posted: 11 Feb 2019 | Premiered: 11 Feb 2019

TOPICS: 
CoreLight

Insecure Open Source Components
sponsored by Veracode, Inc.
WHITE PAPER: Access this paper to learn about the risks of insecure open source components and how to prevent those vulnerabilities with application security tools that integrate with your IDE.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

TOPICS: 
Veracode, Inc.

Broken Access Controls
sponsored by Veracode, Inc.
WHITE PAPER: Read this paper to find out how weak security controls could allow unauthorized users to access things you don't want them accessing and learn how to prevent these issues with secure coding practices.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

TOPICS: 
Veracode, Inc.

How 2,300 IT Leaders Are Tackling the Cloud
sponsored by Nutanix
WHITE PAPER: Vanson Bourne Research asked over 2,300 IT decision makers across multiple industries, business sizes, and geographies about how they're sculpting their cloud environments and managing projects in today's IT world. Dive into this report to find out how they responded – and discover how your organization can learn from their successes and mistakes.
Posted: 15 Feb 2019 | Published: 15 Feb 2019

TOPICS: 
Nutanix

Firewall, You're Fired
sponsored by 128 Technology
WHITE PAPER: Download this white paper for the benefits of zero trust and how you can implement this model in your environment.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

TOPICS: 
128 Technology

Neustar Security Solutions Overview
sponsored by Neustar
WHITE PAPER: Learn about Neustar and their approach to DNS and security. Tap into this resource to find out how you can maintain network performance while tightening security for key areas, like DDoS protection and identity assurance.
Posted: 13 Feb 2019 | Published: 15 Jan 2018

TOPICS: 
Neustar

Accelerating Security Response
sponsored by ServiceNow
WHITE PAPER: Financial institutions have long been leaders in information security, spending a significant amount of their IT budgets on safeguarding their companies. While they have always been working on reducing threats, new challenges continue to emerge. In this white paper, learn about some of the new challenges financial institutions are facing.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

TOPICS: 
ServiceNow

Network Security that's Built Right In
sponsored by 128 Technology
WHITE PAPER: Learn about a zero trust security model that's designed to help businesses mitigate the risk of cyberattacks by enabling granular network segmentation, policy-based inter-router traffic encryption, fully distributed firewall protection, and more.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

TOPICS: 
128 Technology
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement