IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive No. 7

RSS Feed   
Homeland Security Presidential Directive No. 7 Reports
 
When the Cloud Rains Phish
sponsored by Area 1 Security
WHITE PAPER: When it comes to phishing attacks, every inbox is a prime target. Hackers are discovering more sophisticated methods for targeting employees that have adapted to overcome world-class defenses. Read this white paper to uncover the modern threats the users encounter and discover how to remedy them.
Posted: 08 Jan 2020 | Published: 08 Jan 2020

Area 1 Security

ZS Solves Office 365 Security Issue with PortSys TAC
sponsored by PortSys
CASE STUDY: The threat of a data breach can damage an organization’s reputation with both customers and vendors. When ZS made the decision to implement Office 365, they needed enhanced security to cover data encryption and endpoint management. Read this case study to follow ZS’s journey towards a holistic data loss prevention strategy.
Posted: 06 Jan 2020 | Published: 06 Jan 2020

PortSys

A Buyer’s Guide to Privacy-Centric Data Discovery
sponsored by BigID
WHITE PAPER: Protecting customer data has never been easy. And with the introduction of regulations like GDPR and CCPA, organizations face heavy penalties for failing to address this issue. Use this buyer’s guide to stay informed on the key components to look for in data discovery partner.
Posted: 07 Jan 2020 | Published: 07 Jan 2020

BigID

Your Email Security is Ineffective, and Getting Worse
sponsored by Ironscales
WHITE PAPER: The impacts of phishing attacks continue to expose the gaps in current email security tactics and highlights why organizations need to adapt their existing approach to meet the requirements of modern threats. Read on to uncover the key data insights from this Aberdeen study into the email security landscape.
Posted: 14 Jan 2020 | Published: 30 Jun 2019

Ironscales

A Buyer’s Guide to Automating Personal Data Rights for CCPA and GDPR
sponsored by BigID
WHITE PAPER: With the arrival of data rights and privacy regulations, organizations face increasing pressure to maintain strategies that ensure data protection. The risks for failing to do so include financial, legal and reputational damage. Read this buyer’s guide to ensure your organization informed on the key aspects of data discovery.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

BigID

AlienVault USM vs SIEM
sponsored by AT&T Cybersecurity
RESOURCE: Like any other security program, SIEM was helpful at detecting threats for a time. When new compliance regulations began requiring data records, SIEM became unable to handle the increased volume. This white paper highlights the shortcomings of SIEM and explores AlienVault’s Unified Security Management (USM) platform. Read on to learn more.
Posted: 07 Jan 2020 | Published: 07 Jan 2020

AT&T Cybersecurity

Moving Security Up the Value Chain Through the Power of Partnership
sponsored by Dell SecureWorks
CASE STUDY: In this case study, learn how Secureworks deployed a cybersecurity solution across the McLaren group to protect the group in real-time against threats to its IP, data and business processes.
Posted: 10 Jan 2020 | Published: 10 Jan 2020

Dell SecureWorks

DevSecOps Framework
sponsored by WhiteHat Security
WEBCAST: DevSecOps involves many different team members, all with different responsibilities, priorities, and end goals. Thankfully, security automation enables collaboration. Watch this webinar to see how DevSecOps can influence better teamwork – and security practices.
Posted: 10 Jan 2020 | Premiered: Jan 10, 2020

TOPICS:  Security
WhiteHat Security

Quick Study: A Well-Defined Digital Transformation
sponsored by Hyland
WHITE PAPER: Gain access to a cheat-sheet to reference as you craft your organization’s digital transformation strategy for 2020 – and learn about the key technology choices you’ll need to know along the way.
Posted: 13 Jan 2020 | Published: 13 Jan 2020

Hyland

Container Security: Fundamental Technology Concepts that Protect Containerized Applications
sponsored by Aqua Security
RESOURCE: Need a refresher on containers? Get back to the roots (literally) with this line-by-line walkthrough of the containerized process. Inside this 30-page guide, you'll find guides on isolation, namespaces, and the popular processes for containers. Click here to access the guide now.
Posted: 07 Jan 2020 | Published: 07 Jan 2020

TOPICS:  Security | Software
Aqua Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info