IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Presidential Decision Directive 63

RSS Feed   
Presidential Decision Directive 63 Reports
Is My Smart Home Telling People What I Do Every Day?
sponsored by Radware
RESOURCE: Click inside to learn about the current state of smart home security, as well as some steps providers should take in the near future to protect their customers.
Posted: 07 Mar 2018 | Published: 13 Feb 2018


8 Point Mobility Checklist
sponsored by Fujitsu
RESOURCE: In today's digital-first world, mobile computing and modern communications are changing the way organizations operate. Securely integrating new devices into your existing mobility strategy can be difficult and time consuming. Download this 8 point checklist to ensure a successful mobility strategy.
Posted: 12 Mar 2018 | Published: 12 Mar 2018


The General Data Protection Regulation (GDPR) is Here
sponsored by BackOffice Associates
WEBCAST: In this webcast hear from Enza Iannopollo, Security & Risk analyst at Forrester Research, as she demonstrates how to get started on building a risk management policy that will best suit the needs of your company.
Posted: 16 Mar 2018 | Premiered: Mar 16, 2018

BackOffice Associates

Accelerate Cloud Transformation
sponsored by Cloud Spectator, LLC
WEBCAST: Watch this video for a comprehensive cloud readiness framework to help map out where your organization stands and accelerate your transformation to the cloud.
Posted: 09 Mar 2018 | Premiered: Mar 9, 2018

Cloud Spectator, LLC

Three Moves for CIOs to Lower Business Costs With Cloud
sponsored by NetApp
RESEARCH CONTENT: In this Gartner research report, explore how you can overcome the cost challenges associated with moving to a cloud computing environment through 3 simple steps.
Posted: 13 Mar 2018 | Published: 24 Mar 2017


CW ASEAN - March 2018: Time to dial up defences
sponsored by
EZINE: In this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.
Posted: 08 Mar 2018 | Published: 08 Mar 2018

Data Classification Services and Keeping Cloud Data Secure
sponsored by Data443
EGUIDE: In this expert guide, Dave Shackleford details how data classification services can help organizations ensure their cloud data is secure.
Posted: 12 Mar 2018 | Published: 31 Aug 2016


Security Tools: An Attacker's Dream Come True
sponsored by enSilo
RESOURCE: Although security tools provide protection, they are intrusive by nature and can often act as a double-edged sword. This resource examines vulnerabilities and risks posed by security tools as well as practical steps CISOs and their teams can take to protect their networks.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

Visibility, Detection and Control for Building Automation
sponsored by SecurityMatters
RESOURCE: How are you gaining visibility and remaining secure within your networks? Utilize this resource to learn how to gain full visibility into building automation networks and detect threats before they lead to operational or cyber incidents.
Posted: 28 Feb 2018 | Published: 28 Feb 2018


Magnify Traffic Visibility for Security in VMware Networks
sponsored by APCON, Inc.
RESOURCE: Learn how to coordinate and architect network traffic monitoring in a VMware environment to improve security.
Posted: 12 Mar 2018 | Published: 29 Dec 2017


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement