Data Security, Enterprise Identity, Enterprise Security

Supply Chain Security in MongoDB’s Software Development Lifecycle

May 25, 2022

Supply Chain Security in MongoDB’s Software Development Lifecycle
Cybersecurity breaches do more than expose data to malicious actors. They generate headlines, captivate the public’s attention, and shine a light on security gaps. Whether it’s weak passwords or the software supply chain, if a vulnerability exists, cybercriminals will exploit it.

Spotlight

Tanager Inc

Tanager is a leading Woman Owned Small Business systems integration company providing innovative solutions in areas of Information Assurance, Cyber Security, Insider Threat, Helpdesk Services, Informational Technology and Healthcare Knowledge Management. Since Tanager was founded in 1996, the support provided to our customers has been our #1 priority. Our customer base consists of Fortune 500 commercial customers, and federal intelligence agencies, including the Department of Defense. Tanager’s Research and Development (R&D) Department was appraised at CMMI Maturity Level 2 in 2012. Tanager, Inc. has a good Dun & Bradstreet rating and an approved DCAA accounting system. Our Information Technology professionals and reliable products provide the services needed to deliver solutions that are cost-effective, improve missions’ performance, and enhance the Quality of Service (QOS) to the customer.

OTHER WHITEPAPERS
news image

Cybersecurity Considerations for Distributed Energy Resources on the U.S. Electric Grid

whitePaper | October 26, 2022

To address the impacts of climate change, the U.S. electric grid will be undergoing significant changes by integrating clean energy resources such as solar and wind. These efforts will be accelerated with the recent passage of the Infrastructure Investment and Jobs Act1 and the Inflation Reduction Act.

Read More
news image

2023 Data Protection Trends Executive Brief United States Edition

whitePaper | February 8, 2023

In late 2022, an independent research firm completed their survey of 4,200 unbiased IT leaders and implementers on a variety of data protection drivers, challenges, and strategies — including 1175 in United States. This broad-based market study on unbiased organizations is conducted annually on Veeam’s behalf to understand how the data protection market continues to evolve, so that Veeam can ensure product strategies and market initiatives align with where the market is going.

Read More
news image

ZTE Cybersecurity White Paper 2021

whitePaper | October 29, 2021

Telecommunications equipment and systems, as critical infrastructure for a nation, have been widely valued by governments, operators, and users worldwide. Currently, the deployment of 5G has begun. Featuring faster speed, greater network capacity, and ultra-low latency, 5G will redefine the operation of critical infrastructure from the factory floor to the cloud. Its new technologies including Software-Defined Networking (SDN), Network Function Virtualization (NFV), Multi-access Edge Computing (MEC), and network slicing are paving the way for smart cities, remote surgery, autonomous vehicles, and large-scale Internet of Things (IoT) connectivity.

Read More
news image

Best Practices for Row Level Security in Tableau with Entitlements Tables

whitePaper | January 18, 2023

Row Level Security (RLS) in Tableau refers to restricting the rows of data a certain user can see in a given workbook or data source at the time they view the data. It contrasts with permissions within Tableau Server (or Tableau Online), which are used to control access to content and feature functionality.

Read More
news image

Is Cyber Security Meeting Today’s Intensifying Challenges?

whitePaper | September 22, 2022

Cybersecurity has always been critical, but it’s taken on new urgency today. Cyberattacks have escalated in intensity and volume. At the same time, IT is experiencing the pressing challenges of a technology modernization revolution. Driving this tech revolution are remote work environments, a skills shortage and unprecedented growth in cloud deployments. These developments bring increasing requirements to proactively secure environments, deflect risks and rapidly respond to cyberattacks.

Read More
news image

Webex App Security Cloud Collaboration Security Technical Paper

whitePaper | November 24, 2022

Webex is a cloud collaboration platform that provides messaging, calling, and meeting features. The Webex App is a client application that connects to this platform and provides a comprehensive tool for teamwork. Users can send messages, share files, make calls, and meet with different teams, all in one place. This security technical paper provides an overview of the security features of Webex App running on Windows, Mac, iOS, Android, Linux, ChromeOS, and Web.

Read More

Spotlight

Tanager Inc

Tanager is a leading Woman Owned Small Business systems integration company providing innovative solutions in areas of Information Assurance, Cyber Security, Insider Threat, Helpdesk Services, Informational Technology and Healthcare Knowledge Management. Since Tanager was founded in 1996, the support provided to our customers has been our #1 priority. Our customer base consists of Fortune 500 commercial customers, and federal intelligence agencies, including the Department of Defense. Tanager’s Research and Development (R&D) Department was appraised at CMMI Maturity Level 2 in 2012. Tanager, Inc. has a good Dun & Bradstreet rating and an approved DCAA accounting system. Our Information Technology professionals and reliable products provide the services needed to deliver solutions that are cost-effective, improve missions’ performance, and enhance the Quality of Service (QOS) to the customer.

Events