Robuta

https://sileo.swiss/produkte-services/it-heartbeat/
Aug 2, 2022 - Enterprise Lösung für 24/7 Monitoring, Anti-Malware, integriertem Patch-Management und Inventar-Feature
patch managementheartbeatmonitoringsecurityamp
https://dhsem.colorado.gov/grants-management/grant-announcements
A list of grant announcements will be maintained on this page three years.
homeland securityemergency managementgrantannouncementsdivision
https://dhsem.colorado.gov/NDME
The division manages the National Disaster Mitigation Enterprise (NDME) created by House Bill21-1208.
natural disasterenterprise divisionhomeland securitymitigationemergency
https://solutionsreview.com/security-information-event-management/siem-best-selling-books/
Jul 12, 2023 - A library of the most popular books on Security Information and Event Management (SIEM). IT Auditing, Network Security Monitoring (NSM) and Log Management.
best sellingsecurity informationevent managementbooksamp
https://dhsem.colorado.gov/info-center/cora-info-requests/general-request-for-information-form
general requesthomeland securityinformationdivision
https://www.hsgac.senate.gov/subcommittees/dmdcc/
Jul 23, 2025 - Subcommittee Rules [DMDCC Rules of Procedure – 119th Congress] Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum et rhoncus sapien. Fusce...
disaster managementdistrictcolumbiacensuscommittee
https://insight.maticmind.it/insights/cloud-security-posture-management-proteggi-gli-ambienti-multicloud
Scopri come il CSPM tutela ambienti multicloud con analisi continua, automazione e governance integrata grazie all’expertise di Maticmind Security
security posture managementcloudproteggigliambienti
https://www.guidepointsecurity.com/strategic-approach-to-ensuring-a-stronger-cybersecurity-posture/
Oct 16, 2025 - GuidePoint Security's GPVUE provides security program management tailored to your unique environment and needs - so you understand your security posture...
security programstrategicmanagement
https://blog.methods.co.uk/case-studies/implementing-a-cyber-security-management-system
We successfully delivered CSMS deliverables and a Vehicle Threat and Remediation Analysis (TARA) document, and methodology to support the identification and...
cyber security managementimplementingsystem
https://dhsem.colorado.gov/dhsem/local-contacts
Use the links below to find your local emergency management or homeland security coordinators. Emergency Management Contacts Homeland Security Grant...
local contactshomeland securityemergency managementdivision
https://dhsem.colorado.gov/emergencyalert
The following is a list of county-level emergency management websites, phone (office and 24-hour), emails and sms/text alert systems in Colorado. In...
homeland securitylocalemergencymanagersdivision
https://www.suse.com/solutions/manage-secure/
Unify hybrid, multi-cloud, and edge environments on one platform. Reduce costs, automate security, and gain intelligent observability to scale with confidence.
hybrid cloudsimplifymanagementsecurity
https://www.intertek.com/assurance/iso-18788-psc1/
ISO 18788 provides business and risk management for security operations management systems (SOMS).
management systemsprivate securityisopsccompany
https://solutionsreview.com/identity-management/tag/entro-security/
identity access managementsoftware toolsentrosecurityarchives
https://dhsem.colorado.gov/dhsem/dhsem-organization-chart/ciac-organization-chart
Colorado Information Analysis Center OverviewThe Colorado Information Analysis Center (CIAC) serves as the focal point within the state for receiving,...
homeland securityemergency managementciacorganizationchart
https://www.legitsecurity.com/press-releases/legit-security-launches-advanced-code-change-management
New features provide AppSec, development teams with increased visibility, automated security reviews
change managementlegitsecuritylaunchesadvanced
https://www.clearancejobsblog.com/company-security-management-office-smo-responsibilities-and-lingo/
When a defense contractor's Security Management Office (SMO) offers someone a job in a sensitive position that requires a security clearance there…
security managementcompanyofficesmoresponsibilities
https://www.dataminr.com/resources/solution-sheet/elevate-your-corporate-security-risk-management/
Sep 16, 2025 - Access our solution sheet to elevate your corporate security risk management with Dataminr Pulse for Corporate Security.
corporate securityrisk managementelevatedataminr
https://cyberint.com/blog/other/attack-surface-management-from-passive-scanning-to-active-security-testing/
Jan 8, 2025
attack surface managementsecurity testingpassivescanningactive
https://www.datacenterknowledge.com/security-and-risk-management
Explore the latest news and expert commentary on Security & Risk Management brought to you by the editors of Data Center Knowledge
data center knowledgerisk managementrecent newssecurity
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
Oct 20, 2025 - Learn how to build your expertise in ISO/IEC 27001, the international standard for Information Security Management Systems (ISMS). Whether you’re...
information securitymanagement systemtraining coursesiso
https://www.traceable.ai/api-catalog-discovery
Nov 29, 2023 - Traceable's API Security platform provides automatic API Security Posture Management: API discovery for comprehensive visibility into all APIs, sensitive...
security posture managementapi
https://www.tigera.io/learn/guides/kubernetes-security/kspm/
Oct 28, 2024 - Kubernetes security posture management (KSPM) refers to a set of processes and tools aimed at maintaining the security and compliance of a Kubernetes cluster...
security posture managementkubernetes
https://dc.gov/external-link/homeland-security-and-emergency-management-agency-facebook
emergency management agencyhomeland securityfacebookdc
https://avensus.nl/high-grade-security/
Jul 16, 2024 - The encryption os data inside your organization is critical. Avensus High Grade Security is an expert and supports with encryption and key management.
high gradesecurity encryptionkey managementhsm
https://www.attackiq.com/ctem/
Oct 17, 2025 - Learn how CTEM helps organizations proactively identify, validate, and mitigate security risks. AttackIQ’s Adversary Exposure Validation (AEV) makes CTEM...
threat exposure managementcontinuousctemproactivesecurity
https://www.uwstout.edu/programs/hospitality-security-risk-management-minor
Develop your skills and increase your knowledge relevant to security in our broad range of quality courses.
risk managementhospitalitysecurityampminor
https://www.ascgroup.in/risk-technology-consulting/cybersecurity-compliance-solutions/information-security-management-system-iso-27001-assessment-and-implementation
Information Security Management System ISO 27001 Assessment and implementation
information securitymanagement systemisoassessmentimplementation
https://solutionsreview.com/security-information-event-management/security-information-event-management-vendor-map/
Jul 12, 2023 - The Security & Information Event Management Vendor Map charts the top vendors in the SIEM cybersecurity market across three key capabilities.
event managementsecurityampinformationvendor
https://www.tenable.com/blog/exposure-management-is-the-future-of-proactive-security
Exposure management, at its core, is about shifting from reactive to proactive security and understanding risk in the context of the business.
exposure managementfutureproactivesecurity
https://www.pcmag.com/reviews/avast-premium-business-security?test_uuid=04IpBmWGZleS0I0J3epvMrC&test_variant=A
Nov 7, 2025 - Avast Premium Business Security prioritizes the essentials to focus on what businesses need, enabling you to monitor and manage every company computer remotely...
business securityremote managementavastpremiumreview
https://www.itsicherheit-online.com/kategorie/security-management/
Magazin für Management und Technik
security management
https://www.cohesity.com/solutions/state-and-local-government/
Cohesity provides state and local government and educational institutions (SLED) with a simple, efficient, and secure way to protect and manage data while...
government datasecuritymanagementsledcohesity
https://duo.com/product/identity-security-posture-management-ispm
Learn how ISPM enhances visibility into identity security, helping you proactively defend and protect your organization’s passwordless perimeter.
security posture managementidentityispmduo
https://www.idsalliance.org/event/identity-management-day-2022/
Jun 3, 2025 - The Mission of IMD 2022 is educate consumers, business leaders and IT decision makers on the dangers of not properly securing identities and access credentials
identity managementdaydefinedsecurityalliance
https://www.bitdefender.com/en-us/business/infozone/what-is-cspm
Sep 5, 2025 - Explore the meaning of CSPM (Cloud Security Posture Management) and how it can help your organization’s cloud assets remain secure and compliant.
security posture managementcloudcspm
https://www.iso.org/publication/PUB100484.html
ISO/IEC 27001:2022 - Information Security Management Systems - A practical guide for SMEs has been authored by technical experts from ISO/IEC JTC1/SC27. This...
information securitymanagement systemsiso
https://solutionsreview.com/security-information-event-management/identity-management-and-information-security-news-for-the-week-of-july-19-regscale-pindrop-appviewx-and-more/
Jul 19, 2024 - The have curated this list of the most noteworthy identity management and information security news for the week of July 19.
information security newsidentity managementweek
https://charliai.com/trust-risk-and-security-management-in-ai-systems/
Oct 7, 2024 - POSITION PAPER: Trust, Risk and Security Management in AI Systems As AI is gaining traction in the industry, enterprises are faced with existential...
security managementai systemstrustriskcharli
https://riedel-networks.net/en/solutions/riedel-enterprise-defense/siem
Aug 8, 2024 - Included with RIEDEL Enterprise Defense [R .E.D.]: A SIEM solution co-developed by hackers. Want a demo?
siem securityevent managementinformation
https://www.govciooutlook.com/cxoinsights/government-security-and-emergency-management-nid-2048.html
The National Preparedness Goal defines what it means for the whole community to be prepared for all types of emergencies.
government securityemergency management
https://www.iata.org/en/publications/newsletters/iata-knowledge-hub/navigating-the-current-landscape-of-security-management-systems-sems/
Join our webinar on aviation security. Learn to adapt and fortify your plan against evolving threats. Stay informed about trends and emerging risks.
iatademandwebinarnavigatingcurrent
https://solutionsreview.com/security-information-event-management/category/news/page/3/
identity managementnews archivesbestinformation
https://docs.akto.io/traffic-connector/api-gateways/connect-akto-with-azure-api-management
api managementsecurity platformconnectaktoazure
https://www.aikido.dev/scanners/cloud-posture-management-cspm
Detect misconfigurations and strengthen cloud security with Aikido’s CSPM. Improve compliance across providers, fast. Start scanning for free.
security posture managementcloudcspmaikido
https://solutionsreview.com/security-information-event-management/category/news/
identity managementnews archivesinformation securitysiem toolsbest
https://www.techtarget.com/searchsecurity/tip/When-to-consider-Kubernetes-security-posture-management
Nov 19, 2025 - Kubernetes security posture management tools help ensure clusters are securely configured. Learn how they aid risk identification and threat mitigation.
security posture managementconsiderkubernetestechtarget
https://www.wilmorite.com/about/security/
Aug 15, 2023 - Safety Wilmorite’s Security Division is responsible for a combination of life-safety programs and protective services. Wilmorite provides security...
securitymanagementgroupllc
https://patchmypc.com/role/security-teams/
Feb 10, 2025 - Need a solution for vulnerability management? Discover how we simplify securing your IT environments, ensuring faster patching and proactive risk mitigation.
endpoint managementsecurity teamscustompatchpc
https://crestsolution.com/resources/our-success-stories/malaysian-insurance-provider/
Jan 7, 2026 - Transforming API security and management for a leading Malaysian insurance provider
api securitytransformingmanagementleadingmalaysian
https://www.cybermaxx.com/resources/category/security-control-management-scm/
Read more about brightfin's Security Control Management (SCM) resources here.
securitycontrolmanagementscmarchives
https://www.brighttalk.com/webcast/11673/650357
Join the Qualys Cloud team as we take a deeper dive into the alphabet soup with Cloud Security Posture Management (CSPM) and Cloud Workload Protection (...
cloud securitydeep diveepisode
https://www.osce.org/node/660085
Manages the material and financial resources of the Organization
departmentmanagementfinanceorganizationsecurity
https://saviynt.com/blog/non-human-identity-security-with-identity-security-posture-management
Nov 3, 2025 - Learn how Saviynt's Identity Security Posture Management (ISPM) solution adapts and secures the next frontier of enterprise cyber risk, non-human identities...
identity securitynonhumanposturemanagement
https://www.mimecast.com/
Protect email and collaboration tools with Mimecast. Manage human risk and stay ahead of cyber threats with advanced security solutions.
human risk managementemail securityadvancedmimecast
https://www.fws.gov/program/emergency-management-and-physical-security
Emergency management is a key part of the U.S. Fish and Wildlife Service mission of protecting fish and wildlife and their habitats for the continuing benefit...
emergency managementphysical securityfishampwildlife
https://directus.io/solutions/enterprise
Bridge the gap between your technical and non-technical teams and handle large-scale, complex data operations with Directus.
enterprise data managementsecurityscale
https://www.bureauveritas.co.za/ISO-27001
ISO 27001: Information Security Management System Information security breaches can have a major impact on your company’s business continuity and revenues....
information securitymanagement systemisosafeguardorganisation
https://dc.gov/external-link/homeland-security-and-emergency-management-agency-twitter
emergency management agencyhomeland securitytwitterdc
https://www.cohesity.com/solutions/telecom/
Manage, protect, and streamline your telecom data with Cohesity's data management and protection solution. Learn more today.
data securitymanagementtelecomcohesity
https://homeland.house.gov/emergency-preparedness-response-and-recovery/
emergency managementhomeland securitytechnologycommittee
https://ontic.co/
Nov 18, 2025 - Unify your cyber and physical security data, streamline operations, and unlock the insights that elevate security as a trusted partner to the business with...
security managementsoftware
https://www.infotech.com/research/ss/develop-and-implement-a-security-incident-management-program
Organizations face an ever-evolving range of cyberthreats. It is crucial to have a security incident management program to detect, respond, an...
security incidentprogram infodevelopimplementmanagement
https://www.wibu.com/quality-management.html
quality managementbenchmarktrustinnovationsecurity
https://solutionsreview.com/security-information-event-management/top-security-information-and-event-management-siem-resources/
Jun 6, 2024
security informationevent managementtopsiemamp
https://dhsem.colorado.gov/info-center/internships/internship-opportunities
Current internship opportunities will be listed below:Homeland Security, Critical Infrastructure, Cyber Security and Colorado Information Analysis CenterThere...
internship opportunitieshomeland securityemergency managementdivision
https://www.watchguard.com/wgrd-products/endpoint-security-modules
Deploy updates and patches to prevent cyberattacks while protecting data from internal and external threats with WatchGuard Endpoint Security Modules.
patch managementdata protectionendpoint securityamp
https://www.unite.ai/continuous-monitoring-filling-the-security-gaps-in-supplier-risk-management/
Supply chains are the glue that holds the global economy together. They’re also a significant source of cyber-related business risk. Attacks on suppliers...
continuous monitoringrisk managementfillingsecuritygaps
https://solutionsreview.com/security-information-event-management/siem-buyers-guide-security-information-and-event-management/
Jul 12, 2023 - A Complete Guide to the the Top SIEM Solutions Providers - 30 Pages. Overview of SIEM | 10 Questions to Ask in an RFP | Profiles of the Best SIEM Vendors.
security informationevent managementsiembuyerguide
https://www.securitas.com/en/security-services/operation-management-security-services/
The Securitas Operations Center (SOC) is the operational hub of our security framework. The combination of advanced technology and our operators’...
security servicesoperationmanagement
https://www.opensourceforu.com/2025/10/data-management-and-security-game-changers-in-the-digital-world/
Oct 29, 2025 - This is where data management comes into play.
data managementgame changersdigital worldsecurity
https://firecompass.com/supply-chain-and-3rd-party-risk-management-old/
Jul 29, 2024 - With FireCompass Gain Instant Visibility Of Shadow Risks And Build Assets Inventory To Implement Security Controls OnSubsidiary Assets Controls By Conducting...
cyber securitysupply chainrisk managementpartybackup
https://dhsem.colorado.gov/dhsem/dhsem-organization-chart/office-of-grants-management-organization-chart
Office of Grants Management OverviewThe mission of the Grants Management Office is to standardize, streamline and improve federal and state grant management...
grants managementhomeland securityofficeorganizationchart
https://business-services.heise.de/security/security-management
Erfahren Sie von Experten, wie Sie das Security Management in Ihrem Unternehmen optimieren. Profitieren Sie von unseren Expertentipps!
security managementunternehmenundtoolsheise
https://orca.security/platform/vulnerability-management/
Oct 10, 2025 - Orca offers industry-leading agentless Vulnerability Management Solutions across your entire cloud infrastructure and cloud-native applications.
cloud vulnerabilitymanagement platformorca security
https://portal.ct.gov/despp/services/emergency-management-and-homeland-security
The Division of Emergency Management and Homeland Security protects CT residents before, during, and after emergency situations.
emergency managementhomeland securityctdivisiongov
https://solutionsreview.com/identity-management/identity-management-and-information-security-news-for-the-week-of-october-3rd/
Oct 3, 2025 - The editors have curated a list of noteworthy news about identity management and information security from the week of October 3rd.
information security newsidentity managementweek
https://www.ara.com/isc/
May 28, 2024 - ARA trainers have performed hundreds of security risk assessments for a wide range of federal government facilities. This hands-on experience...
risk managementinteragencysecuritycommitteeisc
https://www.satellitetoday.com/podcast/2025/12/08/space-traffic-management-for-security-with-neuraspace-ceo-chiara-manfletti/
Dec 8, 2025 - Is space crowded? On Orbit revisits the question with Chiara Manfletti, CEO of Portugal-based space traffic management company Neuraspace.
traffic managementspacesecurityceochiara
https://secureannex.com/blog/prompt-poaching/
Web analytics companies are using browser extensions to monetize your most private thoughts
enterprise softwaresecurity managementannexextensionplatform
https://www.android.com/intl/en_us/enterprise/security/
Securely manage your company's mobile devices with Android Enterprise. Control access, protect against threats, and simplify mobile device management.
mobile device managementandroid enterpriseampsecurity
https://apiiro.com/application-security-posture-management/
Jan 5, 2025
security posture managementapplicationaspm
https://solutionsreview.com/identity-management/identity-management-and-information-security-news-for-the-week-of-september-12th/
Sep 12, 2025 - The editors have curated a list of the most noteworthy news about identity management and information security for the week of September 12th.
information security newsidentity managementweek
https://www.formstack.com/solutions/hipaa-data-security
Safely collect data and manage patient information with our data security tools. Learn more about how Formstack supports your organization's HIPAA compliance.
data securityhipaa compliancemanagementmaintainformstack
https://www.cohesity.com/solutions/energy-and-utilities/
Simplify your data security and management for your energy firm with Cohesity’s data protection solution. Learn more today.
data securityenergy industrymanagementcohesity
https://www.protect.airbus.com/cybersecurity/managed-security-services/vulnerability-management/
Nov 12, 2025 - With our vulnerability management as-a-service solution, Airbus Protect's experts help you stay one step ahead of cyber-criminals.
vulnerability managementeffectivesecurity
https://www.manageengine.com/products/firewall/
ManageEngine Firewall Analyzer is an agent-less Firewall, VPN, Proxy Server log analysis and configuration management software to detect intrusion, monitor...
change managementsecurity auditfirewalllogpolicy
https://solutionsreview.com/security-information-event-management/
May 20, 2025 - Top SIEM Vendors Security Analytics Products Solution Directory, Best Practices, Videos | FREE Buyers Guide Security Information Event Management
best securityevent managementinformationampsiem
https://dhsem.colorado.gov/dhsem/councils-committees-enterprises/hsac/hsac-subcommittee-information/colorado-emergency-4
Please view or download the following CEPC documents:
homeland securityemergency managementdocumentsdivision
https://dmsecuritymanagement.com/
DM Security Management offre una vasta gamma di servizi di sicurezza, portierato, vigilanza e investigazioni private per aziende, enti pubblici e privati....
security managementdmservizidisicurezza
https://dhsem.colorado.gov/info-center/cora-info-requests
Submitting a Colorado Open Records Act to the Colorado Division of Homeland Security and Emergency Management within the Colorado Department of Public...
homeland securityemergency managementcorainforequests
https://www.acronis.com/en/resource-center/resource/acronis-security-posture-management-for-microsoft-365/
Nov 18, 2025 - Acronis Security Posture Management for Microsoft 365 empowers MSPs of any cybersecurity expertise level to provide robust protection to multiple clients at...
security posture managementresource centeracronismicrosoft
https://www.synack.com/products/attack-surface-management/
Nov 14, 2025 - Effective Attack Surface Management (ASM) requires continuous discovery across your assets. Synack’s Attack Surface Discovery (ASD) manages your external...
attack surface managementsecurity testing
https://torq.io/case-management/
Sep 24, 2025 - Torq Security Case Management automates event triage and enriches alerts into actionable cases accelerating detection, analysis, and response.
case managementstreamlinesecuritytorqhyperautomation
https://www.brighttalk.com/webcast/21076/658984
Mastering Cloud Security Posture Management with Cyber Security Cloud (CSC) and Amazon Web Services (AWS) As cyber threats become increasingly sophisti...
security posture managementcloudacrossawsenvironments
https://www.blackduck.com/customer-value.html
See how Black Duck Software helps organizations manage software risk, accelerate secure development, reduce open source risk and improve DevSecOps ROI with...
black duckapplication securityrisk managementdeliverscustomer
https://www.opentext.com/products/security-log-analytics
Simplify security compliance, storage & reporting for log management while accelerating effective threat hunting with fast log search & advanced log analytics
security logcompliance analyticsmanagementtoolsopentext
https://orca.security/platform/cloud-security-posture-management-cspm/
Aug 25, 2025 - The Orca platform includes comprehensive Cloud Security Posture Management (CSPM) that detects misconfigurations and compliance risks across cloud environments.
security posture managementcloudcspmorca
https://dhsem.colorado.gov/training-exercise/course-coordination-process
This process outlines the step-by-step instructions for completing and submitting a DHSEM Course Coordination Request form.
homeland securityemergency managementcoursecoordinationprocess
https://www.idsalliance.org/event/identity-management-day-2025
Jul 21, 2025 - The Mission of IMD 2025, hosted by the IDSA and NCA, is to educate consumers, business leaders and IT decision makers on the dangers of not properly securing...
identity managementdaydefinedsecurityalliance