Back to Search Begin New Search Save Search Auto-Notify
CTO Sessions: Word on the Street - 2024...
Buzzword tracking is overwhelming. From AI to Quantum, it can be challenging for federal agencies to stay on top of the latest trends and understand how they apply to existing and future cyber security strategies. On the first installment of Thales TCT’s CTO Sessions Webcast Series for 2024, Thales TCT’s CTO Office shared their insights and predictions on the top 5 tech trends for the year and what these trends mean for federal age...
Add Favorite
Modernizing Cybersecurity in Government...
Public sector institutions, managing vast amounts of sensitive data with limited resources, face a heightened risk of cyberattacks. Attendees joined our session on January 31 to explore how ServiceNow and Tanium empower these organizations through efficient IT Asset Management and Vulnerability Management, ensuring accurate asset mapping, proactive vulnerability identification, automated patching, and streamlined compliance readiness, ultimate...
Add Favorite
Protect Your Students and Data from Cyb...
Carahsoft and iboss had an informational webinar on the features and benefits of implementing an E-Rate eligible Firewall-As-A-Service (FWaaS). The iboss Zero Trust Edge (ZTE) FWaaS platform can help protect students and data from cyber-attacks. It includes a wide range of advanced features, such as: Advanced Threat Protection (ATP) Cloud App Firewall and Monitoring Intrusion Prevention System (IPS) Advanced Antimalware Defense Domain Name Sys...
Add Favorite
The AI Revolution – Transforming Email...
As cyber threats become more frequent and sophisticated, the adoption of Artificial Intelligence (AI) is reshaping the landscape of email security. This webinar will delve into key aspects of the AI revolution and its pivotal role in protecting against highly sophisticated attacks. Attendees joined Mimecast and Carahsoft to learn: What AI is and What It's Not Benefits of Deploying AI in Cybersecurity Tools Challenges in AI-Powered Threat Detec...
Add Favorite
Securing Mission-Critical Communication...
Defense industries deal with sensitive information that, if leaked, could compromise national security. Want to enable commanders and ground operators to exchange classified information securely? A self-hosted, air-gapped environment is the way to go! Air-gapped collaboration tools ensure a high level of security. They isolate sensitive data from unsecured networks — which empowers users to communicate securely without compromising the...
Add Favorite
More Securely Innovate the Enterprise
In the continually changing landscape of modern governance, federal civilian agencies must prioritize secure innovation within their environment. While harnessing technological advancements is crucial for enhancing public services and operational efficiency, it must be done hand in hand with a resolute dedication to cybersecurity. Red Hat hosted the More Securely Innovate the Enterprise event in Denver where government and IT professionals cam...
Add Favorite
Future-Proofing Aerospace & Satellite C...
Amid a backdrop of escalating cyber threats within the aerospace & satellite (A&S) industry, and with federal agencies like the U.S. Space Force, NASA, and the Intelligence Community deepening ties within the supply chain, cybersecurity compliance has emerged as a linchpin for success. As the Space Force unveils its largest budget yet at $30 billion for FY24, the urgency for A&S vendors to align with federal cybersecurity standards...
Add Favorite
Future-Proofing Aerospace & Satellite C...
Amid a backdrop of escalating cyber threats within the aerospace & satellite (A&S) industry, and with federal agencies like the U.S. Space Force, NASA, and the Intelligence Community deepening ties within the supply chain, cybersecurity compliance has emerged as a linchpin for success. As the Space Force unveils its largest budget yet at $30 billion for FY24, the urgency for A&S vendors to align with federal cybersecurity standards...
Add Favorite
Charting China's Climb as a Leading Glo...
Recorded Future and Carahsoft are excited to invite you to join us subsequent to WEST 2024 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Over the last five years, Chinese state-sponsored cyber operations have transformed, emerging as a more mature, stealthy, and coordinated threat than in previous years, exemplified by the exploitation of zero-day vulnerabilit...
Add Favorite
How to Improve your Cybersecurity Readi...
With cyber threats increasing in volume and sophistication, effective privileged access management (PAM) is now crucial for educational institutes. Best-in-class centralized privilege management enables institutes to establish an agile framework for Zero Trust access today and tomorrow, regardless of operating system (OS) or domain. In this webinar, learn how Delinea can help you protect your privileged accounts. During this on-demand webinar,...
Add Favorite
Back to Search Begin New Search