IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive No. 7

RSS Feed   
Homeland Security Presidential Directive No. 7 Reports
 
Safeguarding Democracy: A Guide To Strengthening Election Security
sponsored by Carahsoft
EGUIDE: Elections are a cornerstone of our democracy – therefore the security and integrity of elections is of the utmost importance. Read this e-guide for comprehensive insight into the current state of election systems and infrastructures, threats targeting our systems and best practices for better election security.
Posted: 22 Jan 2021 | Published: 22 Jan 2021


AT&T Business: Customer Stories – NHS Management, LLC
sponsored by AT&T Cybersecurity
CASE STUDY: In this case study, see how NHS Management, a healthcare provider that supports 50 nursing homes, was able to address the growing security needs of their patients and establish a threat detection and incident response program that allowed them to protect and prevent unwanted access to patient data – read on for the full story.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

AT&T Cybersecurity

RiskTech 100 2021 Research Report
sponsored by MetricStream
RESEARCH CONTENT: Changes in the risk and compliance landscape were accelerated last year, likely due to the spread of COVID-19 – So what will the technology trends, security threat types and emerging offerings in this landscape look like in 2021? Read this exclusive RiskTech 100 research report to find out.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

MetricStream

Virtualization-Based Security - External Key Management
sponsored by Thales
WHITE PAPER: Thales Trusted Cyber Technologies (TCT) is a U.S. based provider of government high-assurance data security solutions. Their mission is to provide innovative solutions to protect the most vital data from the core to the cloud to the field. Scan this white paper to get a closer look at TCT and their enterprise cryptographic key manager.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Thales

Top 3 Security Configurations To Set Up In Your AWS Today
sponsored by Horangi
RESOURCE: With the right preparation and proper configurations, your organization can implement several security practices to reduce the attack surface area and the risk of a breach. In this article, learn how you can get started with Cloud Security Posture Management.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Horangi

Protecting APIs and Securing Applications So Business Can Thrive
sponsored by Radware
RESEARCH CONTENT: Nearly every organization relies on applications to connect with customers, business partners, suppliers and staff. As a result, the application and API threat landscape has evolved dramatically. Read this research report for a closer look at the state of application and API security, including top threats, best practices and more.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Radware

Developers Need Integrated Application Security Tooling
sponsored by Contrast Security
WHITE PAPER: Apps require better collaboration between development and security. In fact, Contrast Security found that 55% of security professionals said it is difficult to get development teams to prioritize remediation of vulnerabilities—even if it’s a performance metric for developers. Learn how to get everyone on board with security in this report.
Posted: 22 Jan 2021 | Published: 22 Jan 2021

Contrast Security

Webinar: How SAP automated Dynatrace Managed at Scale On-demand
sponsored by Dynatrace
WEBCAST: In this webinar, learn how to properly automate Dynatrace Managed at Scale—or in other words, how to manage a multi-thousand environment setup. The webinar dives into everything from continuous configuration management, autonomous setup flows, and the best use cases to follow as reference. Watch the webinar here.
Posted: 27 Jan 2021 | Premiered: Jan 27, 2021

Dynatrace

Why Hackers Hack: The Profile
sponsored by Carbonite
EGUIDE: Hackers are often grouped into 1 of 3 classifications – black hat, white hat and grey hat – depending on their methods, motivations and end goals. Read this e-guide for an overview of each subtype, including an explanation as to why each of them hacks.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Carbonite

Cloud Networks: Shifting into Hyperdrive
sponsored by Barracuda
RESEARCH CONTENT: As organizations continue to radically transform and modernize their infrastructures, public cloud usage continues to soar. However, the evolution of public cloud isn’t without its own set of operational constraints and security concerns. Read this research report for a deep dive into modern public cloud networks.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Barracuda
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info