IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

PDD 63

RSS Feed   
PDD 63 Reports
 
Moving Security Up the Value Chain Through the Power of Partnership
sponsored by Dell SecureWorks
CASE STUDY: In this case study, learn how Secureworks deployed a cybersecurity solution across the McLaren group to protect the group in real-time against threats to its IP, data and business processes.
Posted: 10 Jan 2020 | Published: 10 Jan 2020

Dell SecureWorks

QualiFYI
sponsored by QualiSystems
VIDEO: There’s a massive demand for cyber experts to secure networks with efficiency and confidence. With cyber ranges, testing the defenses is easier and more trustworthy. In this brief interview, Quali discusses how cyber range training is a crucial endeavor that organizations must take on. Click inside the hear why.
Posted: 17 Jan 2020 | Premiered: 17 Jan 2020

QualiSystems

CW Benelux February-April 2020: Ericsson helps driverless buses hit European streets
sponsored by ComputerWeekly.com
EZINE: Ericsson reveals its plans for new technologies including 5G, the internet of things and automation, including driverless buses.
Posted: 24 Jan 2020 | Published: 13 Feb 2020

ComputerWeekly.com

Emerging Technology Analysis: SOAR Solutions
sponsored by ThreatQuotient
WHITE PAPER: Although SOAR and SIEM share similar security capabilities, they are distinct markets unlikely to consolidate. However, technology leaders at SOAR providers need to understand this distinction in order to build upon existing SIEM services. This deep dive from Gartner focuses on SOAR and offers recommendations for SOAR providers.
Posted: 22 Jan 2020 | Published: 07 Dec 2018

ThreatQuotient

Cisco Zero Trust
sponsored by Cisco
WHITE PAPER: Read this paper to learn a comprehensive approach to secure access for your workforce, workloads, and workplace.
Posted: 21 Jan 2020 | Published: 21 Jan 2020

TOPICS:  IT Management
Cisco

Mobile Phishing Killchain
sponsored by Lookout Inc.
RESOURCE: To an attacker looking to execute a phishing attack, mobile devices are an easy target. Continue to this infographic, which follows the lifecycle of a mobile phishing attack from inception to data breach and discover the security measures that could’ve been taken.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

Lookout Inc.

How to assess the true value of your IT investments
sponsored by Citrix
WHITE PAPER: Despite the name, there’s more to ROI than dollar signs when it comes to IT investments. Jump into this guide to learn how to define your business’s technology priorities – and in turn, how to determine the true, innovation-conscious ROI of your IT investments.
Posted: 24 Jan 2020 | Published: 24 Jan 2020

Citrix

Secure Coding Practices: Use Software Composition Analysis
sponsored by WhiteHat Security
WEBCAST: Software composition analysis (SCA) is now a necessary process in application development. Why? Because only 10% of code is written end-to-end by an organization’s developers. Let’s say that another way: applications are built with 90% borrowed code. Watch this webinar to understand and compare your security options.
Posted: 09 Jan 2020 | Premiered: Jan 9, 2020

TOPICS:  Security | Software
WhiteHat Security

AIOps Gets Real: 5 Proven Business Cases for Success
sponsored by Moogsoft
CASE STUDY: Like any technology bundled with artificial intelligence and machine learning capabilities, a lot of the facts about AIOps can get lost amidst heavy marketing noise.Cut through the noise by reading over five real world examples of successful AIOps adoption in organizations just like yours.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Moogsoft

A Complete Guide for How Government Agencies Can Buy Training
sponsored by Global Knowledge
WHITE PAPER: Use this resource to guide your organizations training, learning, and procurement strategies tailored to meet the expanding skillsets of government IT professionals – without breaking budgets.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

Global Knowledge
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info