Whitepaper

Supply chain attacks have not only increased in volume and frequency, but have also become more sophisticated, involving Advanced Persistent Threat (APT) actors. This trend, together with the potentially wide impact of a singular successful supply chain attack, requires organizations to take dedicated steps to ensure the security and integrity of both the software they build and supply to their customers, and/or the software they procure for internal usage.

Added:
Other

To help Palantir Gotham customers who are considering moving to DataWalk, we provide here seven key best practices to help you appropriately plan the decision-making and planning processes to help ensure a smooth migration:

Added:
Podcast

Today we welcome back our special guest, Cliff Berg, co-author of the book Agile 2: The Next Iteration of Agile, as we discuss Agile 2 and DevSecOps partnerships for success.

Added:
Data Sheet

DataWalk is a Palantir alternative for intelligence analysis, providing similar functionality at a dramatically lower cost. Importantly, DataWalk delivers these benefits not only with unique technology, but with a different business model and a different business philosophy.

Added:
eBook

A successful digital transformation among federal financial agencies requires every application, digital service, and the dynamic hybrid and multi-cloud platforms they run on, to work perfectly. All the time. These agencies cannot afford technology-related issues that result in productivity and operations disruptions.

Added:
eBook

Learn how agencies are tapping new funds to ditch legacy systems and address gaps in cybersecurity and service delivery.

Added:
Data Sheet

Drowning in the cost of storing log data? Struggling to move to EL1? You now have options. Do you need to ingest log data to meet the EO M-21-31 logging requirement? Then you need Devo.

Added:
eBook

Government Agencies Identify Top IT Modernization Challenges and Leveraging Cloud and AI for Improved Cybersecurity Posture.

Added:
Case Study

“Ransomware attacks have reached the point where governments need to place an importance on them and develop response plans, similar to how they handle states of emergency.”

— Wendi Whitmore, Vice President X-Force Threat Intelligence, IBM Security

Added:
Report

This year’s IBM Security X-Force Threat Intelligence Index presents an uncomfortable truth: as businesses, institutions and governments continue to adapt to a fast-changing global market—including hybrid and cloud-based work environments — threat actors remain adept at exploiting such shifts.

Added:
Market Intelligence

Gain insights into how government contractors can best take advantage of opportunities as state and local governments approach their fiscal year end.

Added:
Publication

We highlight 10 questions to ask to assess whether your technology is helping your teams work smarter and more productive — or if it’s inhibiting progress by making it more difficult to complete daily tasks and workflows.

Added:
Data Sheet

Leverage a low-code platform to power transparency, compliance, and improved experiences.

Added:
eBook

Recent research surveyed Department of Defense (DoD) and Civilian agency IT mission leaders about the extent to which federal technologists and managers are aware of and have the need for application management services, their current efforts to incorporate new tools and techniques into their agencies, and their general attitudes toward using AI.

Added:
eBook

Blackboard's latest eBook can help by providing essential insights you need to strengthen your program and learning experience — so you emerge with clear criteria for finding the right partner to help future-proof your training strategy.

Added: