IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Presidential Decision Directive 63

RSS Feed   
Presidential Decision Directive 63 Reports
 
Top 10 North American Bank Eliminates Credential Stuffing
sponsored by Shape Security
CASE STUDY: A Big 5 Canadian bank had been suffering from automated attacks on its web and mobile login applications for months. Bad actors were performing credential stuffing attacks on all possible channels. In this case study, learn how Shape's Enterprise Defense service and Threat Intelligence team were able to successfully defend against these attacks.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

Shape Security

Fortinet 2019 Operational Technology Security Trends Report
sponsored by Fortinet, Inc.
ANALYST REPORT: Fortinet's 2019 OT Security Trends Report analyzes data from FortiGuard Labs to glean insights about the state of security for supervisory control and data acquisition (SCADA) and other industrial control systems (ICS). Download the report to discover key findings.
Posted: 14 Aug 2019 | Published: 08 May 2019

Fortinet, Inc.

5 Things to Keep in Mind When Choosing a Single Sign-On Solution
sponsored by Citrix
EBOOK: A single sign-on solution is meant to reduce cost of management, provide better security and improve the user experience. In this e-book, discover the 5 things to prioritize when choosing a single sign-on (SSO) solution.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

Citrix

Live Threat Briefing New Attack Trends in Retail
sponsored by Shape Security
WEBCAST: Watch this briefing to learn the anatomy of the costliest attacks on web and mobile applications, and insights from Top 10 Retailers on successful mitigation techniques.
Posted: 19 Aug 2019 | Premiered: Aug 19, 2019

Shape Security

CISO and Cybersecurity: A Report on Current Priorities and Challenges
sponsored by Fortinet, Inc.
ANALYST REPORT: The CISO and Cybersecurity Report from Fortinet takes a snapshot of how CISOs are approaching cybersecurity, and how their organizations view the CISO. In this report, explore key takeaways from a survey of CISOs at large enterprises.
Posted: 13 Aug 2019 | Published: 27 Jul 2019

Fortinet, Inc.

IT Security and Risk: Intelligent Automation Eases the Burden
sponsored by Oracle Corporation
EBOOK: To protect the enterprise and its assets effectively, the security team must be internal decision-makers and providers. This entails using intelligent automation to secure the assets wherever they are deployed. Download this article to learn more about the importance of automation in security today.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

Oracle Corporation

13 Things Your Next Firewall Must Do
sponsored by Palo Alto Networks
WHITE PAPER: The rapid evolution of IT has changed the face of the network perimeter. The result is an incredibly complex network that introduces significant business risk. In this white paper, explore the evolution of the firewall to "next-generation" and discover 13 key things a next-generation firewall must do to secure your network and your business.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

Palo Alto Networks

Norfolk County Council Bolsters Productivity with IdentityIQ
sponsored by SailPoint Technologies
CASE STUDY: Norfolk County Council (NCC) needed to prioritize an identity-centric security program that alleviated the growing concern over disparate systems and manual processes. In this case study, learn how NCC leveraged SailPoint to manage the identities working within their organization for all types of employment.
Posted: 19 Aug 2019 | Published: 19 Aug 2019

SailPoint Technologies

How to Pick a Winner in EDR
sponsored by Palo Alto Networks
ANALYST REPORT: The MITRE Corporation conducted an independent test of the detection and investigation capabilities of leading endpoint detection and response (EDR) products against real-world attack sequences. This research report will break down the results and what it means for your organization as you assess your endpoint security toolkit.
Posted: 12 Aug 2019 | Published: 21 Jun 2019

Palo Alto Networks

Internet Security Threat Report
sponsored by Symantec
EBOOK: In this year's Symantec Internet Security Threat Report, discover the latest insights into global threat activity, cybercriminal trends, and attacker motivations.
Posted: 21 Aug 2019 | Published: 21 Aug 2019

Symantec
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement