IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Presidential Decision Directive 63

RSS Feed   
Presidential Decision Directive 63 Reports
 
Cybersecurity a Central Ingredient in Evolving Digital Business Models
sponsored by CenturyLink
RESOURCE: Read this blog to learn about integrating sound cybersecurity practices in all areas of the organization, implementing new security capabilities that are baked into modern cloud services and turning DevOps into DevSecOps.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

TOPICS:  Security
CenturyLink

Employing Application Identities to Secure Server Workloads with Aporeto
sponsored by Aporeto
ANALYST REPORT: Learn how Aporeto takes an application identity-based approach well aligned with the attributes of modern infrastructure to protect hybrid clouds from unauthorized access, a range of vulnerabilities, and threats.
Posted: 01 Oct 2019 | Published: 01 Oct 2019

Aporeto

Observations From the Front Lines of Threat Hunting
sponsored by Crowdstrike
WHITE PAPER: This mid-year report provides a summary of OverWatch’s threat hunting findings from the first half of 2019. Download now to review intrusion trends during that time frame, insights into the current landscape of adversary tactics and delivers highlights of notable intrusions OverWatch identified.
Posted: 11 Oct 2019 | Published: 11 Oct 2019


Securing Cloud-Native Workloads with Aporeto
sponsored by Aporeto
VIDEO: When you start trying to deploy and secure apps, it can feel like stepping into a maze. In this video, learn how Aporeto can allow the cloud to become a bright and open landscape with total visibility.
Posted: 03 Oct 2019 | Premiered: 03 Oct 2019

Aporeto

Data Loss Protection: Insider Threat Buyers Guide
sponsored by Code42
RESOURCE: Insider threats are the fastest growing risk your organization faces, with insider threats growing more than 50% over the last four years and now accounting for nearly half of all data loss incidents. Discover the risks, problems, solutions and more in this Insider Threat Buyers Guide by Code42.
Posted: 10 Oct 2019 | Published: 10 Oct 2019

Code42

Is Legacy Identity Infrastructure Holding your Enterprise Back?
sponsored by Okta
RESOURCE: Read this article to learn how Okta can help you overcome IT security challenges, operational complexity, and more.
Posted: 04 Oct 2019 | Published: 04 Oct 2019

Okta

Breaking the Resource Vortex: A Case for Rapid Threat Detection and Response
sponsored by CenturyLink
RESOURCE: In this blog post, learn about a threat management, detection and response (MDR) platform where a customer can set policies based on threat characteristics and then specify a set of actions to take.
Posted: 30 Sep 2019 | Published: 30 Sep 2019

CenturyLink

Harnessing Containers for the Big Data Era
sponsored by Aporeto
WHITE PAPER: With the rise of DevOps, Kubernetes has become extremely popular and with good reason, but securing Kubernetes can be challenging. In this white paper, uncover 3 best practices for securing workloads deployed in a Kubernetes cluster.
Posted: 14 Oct 2019 | Published: 31 Jul 2019

Aporeto

All Access Is Not Created Equal
sponsored by PortSys
RESOURCE: “Context of Access” involves understanding not only the user, but the device they are using, the status of that device, the location of access, and more. Discover why – to securely allow for new business innovation – organizations must understand Context of Access and have the technology to support it.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

PortSys

3 Essential Components of a Managed Security Service for SMBs
sponsored by Avast Software
WHITE PAPER: This white paper examines the current attack surface for SMBs and looks at the 3 essential components of a managed security service, which include protection for data, devices, and people. Read on to learn more.
Posted: 10 Oct 2019 | Published: 10 Oct 2019

Avast Software
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement