IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Presidential Decision Directive 63

RSS Feed   
Presidential Decision Directive 63 Reports
 
End-to-End Secure Cloud Services
sponsored by CradlePoint
DATA SHEET: In this brief, learn about Cradlepoint’s NetCloud Perimeter which provides cloud-based networking services that add multiple, embedded security features to traditional enterprise-class networks.
Posted: 28 May 2020 | Published: 28 May 2020

CradlePoint

XDR For Users
sponsored by Trend Micro
DATA SHEET: Given that 94% of malware incidents come from email, combining email with endpoint detection and response is a powerful capability. Learn about the key capabilities and benefits of Trend Micro XDR for Users, a complete SaaS offering that includes protection, detection, and response across endpoints and email.
Posted: 21 May 2020 | Published: 21 May 2020

Trend Micro

Ensuring Remote Workers Remain Protected
sponsored by Hewlett Packard Enterprise
WHITE PAPER: As our world is increasingly changed by the ongoing pandemic, IT departments have seen an ever-increasing amount of cyber attacks and other digital threats. Avoiding these attacks requires a careful combination of the right hardware and the appropriate best practices. Read on to learn some of these techniques from HP.
Posted: 27 May 2020 | Published: 27 May 2020

Hewlett Packard Enterprise

Why Malicious Hackers Set Their Sights on Hospitals
sponsored by Acunetix
RESOURCE: Cybersecurity (for hospitals or any other organization) is more of a process than an event. While the current statistics on the number of records stolen from hospitals is certainly worrying, hardening security can lead to better outcomes in the future. View this article of best practices for hospital and patient security to get started.
Posted: 29 May 2020 | Published: 29 May 2020

Acunetix

DAST vs SAST: A Case for Dynamic Application Security Testing
sponsored by Acunetix
RESOURCE: When it comes to performing a security test for business applications, most security teams have a preference: DAST or SAST. However, both play a key role in effective security testing strategies. Read this article to learn more about the strengths of implementing the DAST method, and how to address its weaknesses.
Posted: 28 May 2020 | Published: 06 Mar 2020

Acunetix

Workforce Flexibility While Protecting Enterprise Apps and Assets
sponsored by Okta + Netspoke
VIDEO: In this quick video, learn how Netskope and Okta, together, provide simple and secure access to tens of thousands of applications.
Posted: 29 May 2020 | Premiered: 29 May 2020

Okta + Netspoke

Five Recommendations for Increasing IT Security
sponsored by Matrix42
ANALYST REPORT: Download this IDC report for 5 suggestions and ideas on how you can improve your IT protection and maintain operational processes.
Posted: 21 May 2020 | Published: 21 May 2020

Matrix42

Getting Cloud Security Right
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we will consider how to do cloud security right. Regular Computer Weekly contributor Peter Ray Allison explores this issue, weighing up the questions organisations should be asking of their cloud service providers, and whose responsibility cloud security should be.
Posted: 25 May 2020 | Published: 11 May 2020

ComputerWeekly.com

COVID-19: Keeping Your Vulnerability Management Program on Track
sponsored by Vulcan
RESOURCE: As organizations shift towards remote working models to promote social distancing, vulnerability management programs are likely experiencing disruption. While there are significant challenges with remote work, the current situation doesn’t come without benefits for vulnerability management programs. Read this blog post to find out what they are.
Posted: 28 May 2020 | Published: 26 Mar 2020

Vulcan

USM Case Study
sponsored by Matrix42
CASE STUDY: In this case study, follow the journey of USM, an international furniture system manufacturer, as they partner with Matrix42 to integrate a client management tool designed to unify and manage their growing number of endpoints. Read on to unlock the results.
Posted: 26 May 2020 | Published: 26 May 2020

Matrix42
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info