IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive No. 7

RSS Feed   
Homeland Security Presidential Directive No. 7 Reports
 
It's Time for a Smarter Approach: Threat-centric Vulnerability Management
sponsored by Skybox Security
WHITE PAPER: Access this white paper to learn how threat-centric vulnerability management (TCVM) offers a smarter approach for your organization as the threat landscape continues to evolve.
Posted: 08 Feb 2018 | Published: 31 Dec 2017

Skybox Security

Unlock Business Opportunity without Taking Security Risks
sponsored by Juniper Networks
WHITE PAPER: This white paper demonstrates how to successfully align your security and business goals to enable your digital transformation initiatives.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

Juniper Networks

Inside Commvault's Holistic Data Protection Center
sponsored by Commvault
RESOURCE: Click inside to learn how Commvault's Holistic Data Protection Center can help you protect your cloud data from attacks both inside and out, as well as defend against ransomware, prepare for the GDPR, and more.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

Commvault

UK IT Priorities 2018
sponsored by ComputerWeekly.com
EGUIDE: Every year, Computer Weekly conducts a large-scale survey of our readers to find out their IT spending priorities for the year ahead – it's always an interesting take on what's happening in IT departments around the country because it's coming from the leaders making those technology purchasing decisions.
Posted: 12 Feb 2018 | Published: 12 Feb 2018

ComputerWeekly.com

Cyber Security Framework Checklist
sponsored by Lynx Technology Partners
RESOURCE: This resource will walk you through creating your own IT risk program that follows the key elements of the NIST Cyber Security Framework. As an added bonus, uncover 3 reminders for establishing security best practices.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Lynx Technology Partners

UEBA Use Case: Insider Attack Identification
sponsored by Hewlett Packard Enterprise
RESOURCE: Allow this resource to teach you how network monitoring through behavioral analytics or user and entity behavior analytics (UEBA) can help detect and prevent advanced attacks.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

Hewlett Packard Enterprise

2018 Security Predictions
sponsored by Splunk
WHITE PAPER: This resource offers predictions of 2018 and how machine learning and DevSecOps will impact and benefit security strategies.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

Splunk

Image Overload: How the Growth in Imaging Volume is Changing Radiology
sponsored by Merge, an IBM Company
RESOURCE: Find out why the nature of imaging is changing along with the growing demand for radiologists, escalating workloads, and more.
Posted: 23 Feb 2018 | Published: 22 Feb 2018

Merge, an IBM Company

Manage PC, Mobility and iOT with Unified Endpoint Management
sponsored by Citrix
WEBCAST: Watch this webcast to learn how you can deliver apps and data securely to users and how unified endpoint management (UEM) can help solve challenges of traditional client management in the context of the new digital workspace.
Posted: 12 Feb 2018 | Premiered: Feb 12, 2018

Citrix

Deception Technology Comes of Age
sponsored by Illusive Networks
WHITE PAPER: Today, deception technology is gaining more and more attention as an innovative cybersecurity technology that can shift the balance of power back to your business. This white paper details how to embrace deception as a network security tool with 5 compelling reasons.
Posted: 09 Feb 2018 | Published: 09 Feb 2018

Illusive Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement